Published in Volume XVI, 2006, pages 63-96

Authors: Sorin Iftene


A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to some users. The secret may be recovered only by certain predetermined groups which belong to the access structure. Secret sharing schemes have appeared as an elegant solution for the problem of safeguarding cryptographic keys and their applications include now threshold cryptographic protocols and some e-voting or e-auction protocols.


  title={Secret Sharing Schemes with Applications in Security Protocols.},
  author={Sorin Iftene},
  journal={Scientific Annals of Computer Science},
  organization={``A.I. Cuza'' University, Iasi, Romania},
  publisher={``A.I. Cuza'' University Press}