Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Zhe XiaBo YangYanwei ZhouMingwu ZhangHua ShenYi MuPublished in: ProvSec (2019)
Keyphrases
- secret sharing
- provably secure
- secret sharing scheme
- key management
- encryption scheme
- wireless sensor networks
- ad hoc networks
- standard model
- resource constrained
- security model
- blind signature
- blind signature scheme
- diffie hellman
- public key
- hash functions
- secure communication
- secret key
- real time
- signature scheme
- multi party
- low cost
- elliptic curve
- data sharing
- cost effective
- post processing
- digital images
- high dimensional