Visual Cryptography & Threshold Schemes
By Doug Stinson, April 01, 1998
Threshold schemes have found many applications in various types of cryptographic protocols, including secure multiparty computations, key escrow/key recovery schemes, threshold cryptography, and electronic cash.
Visual Cryptography & Threshold Schemes
Visual Cryptography & Threshold Schemes
By Doug Stinson
Dr. Dobb's Journal April 1998
Example 6: If these two properties are satisfied, then the matrices M0 and M1 comprise a two-out-of-n visual-threshold scheme.
Copyright © 1998, Dr. Dobb's Journal