Login / Signup

On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.

Michaël QuisquaterBart PreneelJoos Vandewalle
Published in: Public Key Cryptography (2002)
Keyphrases
  • chinese remainder theorem
  • secret image sharing
  • access control
  • signcryption scheme
  • authentication protocol
  • security requirements
  • key management
  • natural images
  • security analysis