Computationally secure threshold secret sharing scheme with minimal redundancy.
Mikhail G. BabenkoAndrei TchernykhElena GolimblevskaiaNguyen Viet HungVijay ChaurasiyaPublished in: ICCS-DE (2020)
Keyphrases
- secret sharing scheme
- secret sharing
- access structure
- key management
- encryption scheme
- authentication mechanism
- private key
- visual cryptography scheme
- visual cryptography
- signcryption scheme
- black and white
- ad hoc networks
- wireless sensor networks
- multi party
- standard model
- secret image
- ciphertext
- resource constrained
- low cost
- denoising