Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Jan CamenischRobert R. EnderleinGregory NevenPublished in: Public Key Cryptography (2015)
Keyphrases
- secret sharing
- session key
- secure communication
- diffie hellman
- secret sharing scheme
- key exchange protocol
- key exchange
- multi party
- visual cryptography scheme
- electronic voting
- encryption scheme
- password based authenticated key exchange
- secret key
- public key
- key agreement protocol
- computational complexity
- secret image
- key management
- authentication mechanism
- digital images