Login / Signup
Security analysis and improvement of two verifiable multi-secret sharing schemes.
Jia Yu
Rong Hao
Xiangguo Cheng
Published in:
Int. J. Secur. Networks (2013)
Keyphrases
</>
security analysis
secret sharing
secret sharing scheme
encryption scheme
public key
smart card
security requirements
real time
key management
information systems
hash functions
secret key
data sharing
lossless compression
multiscale
image processing
databases