Published in Volume XVI, 2006, pages 63-96

Authors: Sorin Iftene


A secret sharing scheme starts with a secret and then derives from it
certain shares (or shadows) which are distributed to some users.
The secret may be recovered only by certain
predetermined groups which belong to the access structure.
Secret sharing schemes have appeared as an elegant solution for the problem
of safeguarding cryptographic keys
and their applications include now threshold cryptographic protocols and
some e-voting or e-auction protocols.


  title={Secret Sharing Schemes with Applications in Security Protocols.},
  author={Sorin Iftene},
  journal={Scientific Annals of Computer Science},
  organization={``A.I. Cuza'' University, Iasi, Romania},
  publisher={``A.I. Cuza'' University Press}