|
计算机应用研究 2011
Cheater detectable visual cryptography scheme with third trusted party
|
Abstract:
Visual secret sharing is an important branch of secret sharing. Shares are distributed to several partic ipants and overlapping a number of shares can recover the original secret without any cryptographic computation. But if there is a cheater who gives a