Secure secret reconstruction and multi-secret sharing schemes with unconditional security.
Lein HarnPublished in: Secur. Commun. Networks (2014)
Keyphrases
- secret sharing scheme
- key management
- secret sharing
- encryption scheme
- private key
- ad hoc networks
- key distribution
- visual cryptography
- wireless sensor networks
- security protocols
- resource constrained
- visual cryptography scheme
- security analysis
- factor authentication
- secret key
- elliptic curve
- security requirements
- security issues
- image reconstruction
- multi party
- reconstructed image
- information security
- end to end
- security level
- image sequences
- secret image
- multiresolution