First Page | Document Content | |
---|---|---|
![]() Date: 2011-02-28 08:41:34Secret sharing Scheme theory Access structure Scheme Verifiable secret sharing Secret sharing using the Chinese remainder theorem Cryptography Cryptographic protocols Key management | Source URL: www.cs.bgu.ac.ilDownload Document from Source WebsiteFile Size: 335,16 KBShare Document on Facebook |