@dblp

Multiplicative Non-abelian Sharing Schemes and their Application to Threshold Cryptography.

, , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 21-32. Springer, (1994)

Links and resources

Tags