Abstract
A number of works have focused on the setting where an adversary tampers with the shares of a secret sharing scheme. This includes literature on verif......
小提示:本篇文献需要登录阅读全文,点击跳转登录