Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
FIGURE 3.22
Results of computer implementation for 4-secret sharing: (a) P 1 , (b) P 2 , (c)
P 3 , (d) P 4 , (e) A, (f) B, (g) AB, (h) A 90 B, (i) A 180 B (j) A 270 B.
 
 
Search WWH ::




Custom Search