Login / Signup

On constructing 1-cheating immune secret-sharing functions.

WeiGuo ZhangXi SunJunPo Yang
Published in: Int. J. Comput. Math. (2012)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • multi party
  • visual cryptography
  • visual cryptography scheme
  • image processing
  • image reconstruction
  • encryption scheme
  • key management