Linked e-resources
Details
Table of Contents
1 Introduction
2. Preliminaries
3. Adversary Model for Secret Sharing Schemes
4. Basic Secret Sharing
5. Beyond Threshold Access Structures
6. Robust Secret Sharing
7. Verifiable Secret Sharing
8. Proactive Secret Sharing
9. Advanced Topics
10. Conclusion.
2. Preliminaries
3. Adversary Model for Secret Sharing Schemes
4. Basic Secret Sharing
5. Beyond Threshold Access Structures
6. Robust Secret Sharing
7. Verifiable Secret Sharing
8. Proactive Secret Sharing
9. Advanced Topics
10. Conclusion.