R Shi,
Y Chen, C Tan,
Y Luo,
T Li - Journal of Cloud Computing, 2023 - Springer
The traditional threshold secret sharing scheme only allows the participants' sub-secret
shares to be used once in the reconstruction process. Several multi-secret sharing schemes …