Login / Signup

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.

Partha Sarathi RoySabyasachi DuttaKirill MorozovAvishek AdhikariKazuhide FukushimaShinsaku KiyomotoKouichi Sakurai
Published in: ISPEC (2018)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • key management
  • multi party
  • encryption scheme
  • resource constrained
  • real time
  • wireless sensor networks
  • black and white
  • secret image
  • ad hoc networks