Linked e-resources

Details

1 Introduction
2. Preliminaries
3. Adversary Model for Secret Sharing Schemes
4. Basic Secret Sharing
5. Beyond Threshold Access Structures
6. Robust Secret Sharing
7. Verifiable Secret Sharing
8. Proactive Secret Sharing
9. Advanced Topics
10. Conclusion.

Browse Subjects

Show more subjects...

Statistics

from
to
Export