Login / Signup

Perfect Secret Sharing Schemes on Five Participants.

Wen-Ai JacksonKeith M. Martin
Published in: Des. Codes Cryptogr. (1996)
Keyphrases
  • secret sharing scheme
  • secret sharing
  • multi party
  • key management
  • real time
  • response time