Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users
IEEE Trans Inf Forensics Secur(2025)
Key words
Key management,threshold cryptography,sequentially threshold cryptography,proactive secret sharing,private key security,Blockchain
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined