Login / Signup

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).

Erinn AtwaterIan Goldberg
Published in: Security Protocols Workshop (2018)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • encryption scheme
  • multi party
  • visual cryptography scheme
  • mobile devices
  • face recognition
  • high frequency
  • image reconstruction
  • embedded systems
  • key management