Login / Signup
Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing.
David John Zage
Helen Xu
Thomas M. Kroeger
Bridger Hahn
Nolan Donoghue
Thomas R. Benson
Published in:
CoRR (2015)
Keyphrases
</>
secret sharing
multi party
secret sharing scheme
electronic voting
visual cryptography scheme
mobile agents
distributed systems
key management
visual cryptography
privacy preserving
secret image
multi agent
denoising
lightweight
encryption scheme