Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users

Jie Zhang, Futai Zhang*, Xinyi Huang*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Fingerprint

Dive into the research topics of 'Theory and Applications of Sequentially Threshold Public-Key Cryptography: Practical Private Key Safeguarding and Secure Use for Individual Users'. Together they form a unique fingerprint.

Computer Science