Login / Signup
On constructing 1-cheating immune secret-sharing functions.
WeiGuo Zhang
Xi Sun
JunPo Yang
Published in:
Int. J. Comput. Math. (2012)
Keyphrases
</>
secret sharing
secret sharing scheme
multi party
visual cryptography
visual cryptography scheme
image processing
image reconstruction
encryption scheme
key management