Login / Signup

Attacks to some verifiable multi-secret sharing schemes and two improved schemes.

Yanhong LiuFutai ZhangJie Zhang
Published in: Inf. Sci. (2016)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • visual cryptography scheme
  • key management
  • multi party
  • visual cryptography
  • feature extraction
  • ground truth
  • response time
  • data integration