Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
FIGURE 3.20
Implementation results for the proposed visual 3-secret sharing scheme: (a)
P 1 , (b) P 2 , (c) P 3 , (d) A, (e) B, (f) AB, (g) A 120 B, (h) A 240 B, (i)
A 85 B.
 
 
Search WWH ::




Custom Search