Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Jan CamenischRobert R. EnderleinGregory NevenPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- session key
- secret sharing
- secure communication
- secret sharing scheme
- diffie hellman
- key exchange protocol
- key exchange
- visual cryptography scheme
- multi party
- electronic voting
- key agreement protocol
- encryption scheme
- password based authenticated key exchange
- key management
- resource constrained
- public key
- authentication mechanism
- image data