Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks

Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto. Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks. IEEE Transactions on Information Theory, 58(9):6194-6206, 2012. [doi]

Abstract

Abstract is missing.