Chrome Extension
WeChat Mini Program
Use on ChatGLM

Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users

IEEE Trans Inf Forensics Secur(2025)

Cited 0|Views11
Key words
Key management,threshold cryptography,sequentially threshold cryptography,proactive secret sharing,private key security,Blockchain
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined