Login / Signup
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification.
Vipin Singh Sehrawat
Foo Yee Yeo
Yvo Desmedt
Published in:
Theor. Comput. Sci. (2021)
Keyphrases
</>
secret sharing
secret sharing scheme
access structure
set theory
partial order
key management
fuzzy set theory
first order logic
model checking
fuzzy sets
rough sets
encryption scheme
black and white
secret image
co occurrence
decision making
image analysis
high dimensional