<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//TaxonX//DTD Taxonomic Treatment Publishing DTD v0 20100105//EN" "../../nlm/tax-treatment-NS0.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:tp="http://www.plazi.org/taxpub" article-type="research-article" dtd-version="3.0" xml:lang="en">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">109</journal-id>
      <journal-id journal-id-type="index">urn:lsid:arphahub.com:pub:3dc5f44e-8666-58db-bc76-a455210e8891</journal-id>
      <journal-title-group>
        <journal-title xml:lang="en">JUCS - Journal of Universal Computer Science</journal-title>
        <abbrev-journal-title xml:lang="en">jucs</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0948-695X</issn>
      <issn pub-type="epub">0948-6968</issn>
      <publisher>
        <publisher-name>Journal of Universal Computer Science</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3217/jucs-005-07-0367</article-id>
      <article-id pub-id-type="publisher-id">27569</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group subj-group-type="scientific_subject">
          <subject>E.3 - DATA ENCRYPTION</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Randomness in Multi-Secret Sharing Schemes</article-title>
      </title-group>
      <contrib-group content-type="authors">
        <contrib contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Blundo</surname>
            <given-names>Carlo</given-names>
          </name>
          <email xlink:type="simple">carblu@dia.unisa.it</email>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="no">
          <name name-style="western">
            <surname>Masucci</surname>
            <given-names>Barbara</given-names>
          </name>
          <xref ref-type="aff" rid="A1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="A1">
        <label>1</label>
        <addr-line content-type="verbatim">Dipartimento di Informatica ed Applicazioni Università di Salerno, , Italy</addr-line>
        <institution>Dipartimento di Informatica ed Applicazioni Università di Salerno</institution>
        <country>Italy</country>
      </aff>
      <author-notes>
        <fn fn-type="corresp">
          <p>Corresponding author: Carlo Blundo (<email xlink:type="simple">carblu@dia.unisa.it</email>).</p>
        </fn>
        <fn fn-type="edited-by">
          <p>Academic editor: </p>
        </fn>
      </author-notes>
      <pub-date pub-type="collection">
        <year>1999</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>07</month>
        <year>1999</year>
      </pub-date>
      <volume>5</volume>
      <issue>7</issue>
      <fpage>367</fpage>
      <lpage>389</lpage>
      <uri content-type="arpha" xlink:href="http://openbiodiv.net/E4E7FEB5-2108-5BA5-8791-54991013F571">E4E7FEB5-2108-5BA5-8791-54991013F571</uri>
      <uri content-type="zenodo_dep_id" xlink:href="https://zenodo.org/record/6995684">6995684</uri>
      <permissions>
        <copyright-statement>Carlo Blundo, Barbara Masucci</copyright-statement>
        <license license-type="creative-commons-attribution" xlink:href="" xlink:type="simple">
          <license-p>This article is freely available under the J.UCS Open Content License.</license-p>
        </license>
      </permissions>
      <abstract>
        <label>Abstract</label>
        <p>A multi-secret sharing scheme is a protocol to share a number of (arbitrarily related) secrets among a set of participants in such a way that only qualified sets of participants can recover the secrets, whereas non-qualified sets of participants might have partial information about them.  In this paper we analyze the amount of randomness needed by multi-secret sharing schemes. Given an m-tuple of access structures, we give a lower bound on the number of random bits needed by multi-secret sharing schemes; the lower bound is expressed in terms of a combinatorial parameter that depends only upon the access structures and not on the particular multi-secret sharing scheme used.</p>
      </abstract>
    </article-meta>
  </front>
</article>
