Login / Signup
Computationally secure multiple secret sharing: models, schemes, and formal security analysis.
Samaneh Mashhadi
Published in:
ISC Int. J. Inf. Secur. (2015)
Keyphrases
</>
security analysis
secret sharing
encryption scheme
visual cryptography scheme
security requirements
secret sharing scheme
smart card
public key
authentication scheme
multi party
authentication protocol
mutual authentication
feature extraction
security model
lightweight
private key