Login / Signup
Attacks to some verifiable multi-secret sharing schemes and two improved schemes.
Yanhong Liu
Futai Zhang
Jie Zhang
Published in:
Inf. Sci. (2016)
Keyphrases
</>
secret sharing
secret sharing scheme
visual cryptography scheme
key management
multi party
visual cryptography
feature extraction
ground truth
response time
data integration