Secret sharing
Top View
- Q1. Explain Secret and Public Key Cryptography Schemes. Use Small Examples to Illustrate Your Claims
- On-Line Secret Sharing
- Probabilistic Secret Sharing
- Cheating Human Vision in Visual Secret Sharing
- Public Verifiability from Pairings in Secret Sharing Schemes
- Secret-Sharing Schemes: a Survey
- Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
- Visual Secret Sharing: a Review
- An Efficient Lattice-Based Secret Sharing Construction
- Lecture Notes in Secret Sharing
- SETUP in Secret Sharing Schemes Using Random Values
- MPSS: Mobile Proactive Secret Sharing
- Multi-Party Covert Communication with Steganography and Quantum Secret Sharing
- Strong (N,T,N) Verifiable Secret Sharing Scheme
- 9 Secret Sharing and Visual Cryptography Schemes A
- Brief Announcement: Proactive Secret Sharing with a Dishonest Majority
- Secret Sharing in Visual Cryptography
- Secret Sharing Vs. Encryption-Based Techniques for Privacy Preserving Data Mining 1