Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
FIGURE 3.22
Results of computer implementation for 4-secret sharing: (a) P
1
, (b) P
2
, (c)
P
3
, (d) P
4
, (e) A, (f) B, (g) AB, (h) A
90
B, (i) A
180
B (j) A
270
B.
Search WWH ::
Custom Search