A secret-sharing scheme allows to distribute a secret s among n parties such that only some predefined ``authorized'' sets of parties can reconstruct the secret, and all other ``unauthorized'' sets learn nothing about s. The collection of authorized sets is called the access structure. For over 30 years, it was ... more >>>