Search
Now showing items 1-1 of 1
Protected Secret Sharing and its Application to Threshold Cryptography
(University of Missouri--Kansas City, 2016)
In the secret reconstruction of Shamir’s (t,n) secret sharing scheme (SS), shares
released by shareholders need to be protected otherwise, non-shareholders can also obtain the
secret. Key establishment protocol can ...