First Page | Document Content | |
---|---|---|
Date: 2011-02-28 08:41:34Secret sharing Scheme theory Access structure Scheme Verifiable secret sharing Secret sharing using the Chinese remainder theorem Cryptography Cryptographic protocols Key management | Add to Reading ListSource URL: www.cs.bgu.ac.ilDownload Document from Source WebsiteFile Size: 335,16 KBShare Document on Facebook |