<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Result Computation for University of Ibadan Statistics Department Using Anonymous Threshold Scheme</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Otekunrin</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Statistics Department of Statistics University of Ibadan</orgName>
								<orgName type="institution">Nigeria University of Ibadan</orgName>
								<address>
									<postCode>+234-803-835-7957</postCode>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Emehinola</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Statistics Department of Statistics University of Ibadan</orgName>
								<orgName type="institution">Nigeria University of Ibadan</orgName>
								<address>
									<postCode>+234-803-835-7957</postCode>
									<country key="NG">Nigeria</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Result Computation for University of Ibadan Statistics Department Using Anonymous Threshold Scheme</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">7A9241121F876D2D6F41F0396FBEB8C2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Secret sharing</term>
					<term>Resolvable Balanced Incomplete Block Designs</term>
					<term>Anonymous threshold scheme</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper, we constructed (2, 7)-anonymous threshold scheme from the (49, 56, 8, 7, 1) Resolvable Balanced Incomplete Block Design (RBIBD) using MATLAB codes. The (2, 7)-anonymous threshold scheme was then applied to Result Processing Scheme in the Department of Statistics, University of Ibadan. The scheme developed satisfied the security requirements of authenticity, integrity and verifiability thus making it better than the scheme currently being used in the Department.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>Keeping secrets is as old as man. In the early times, human beings kept secrets by inscribing special writings on rocks and walls, keeping of special articles in earthen wares and burying underground etcetera. This has changed drastically today where secrets are kept today using advanced forms of computer technology. Most of our personal information are now on the databases of government, banks, healthcare institutions and other organisations. When these secrets are properly managed, our lives, businesses, political activities and so on are ultimately protected. Secure key management has been an active area of research since the independent works of <ref type="bibr" target="#b1">[1]</ref> and <ref type="bibr" target="#b2">[2]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">SECRET SHARING SCHEMES</head><p>Secret sharing is a method of dividing a secret among a set of { } of n participants. Each of the participants is given a part (share) of the secret in such a way that only certain specified (qualified) subsets of the n participants can reconstruct the secret by combining their shares while certain set of participants gets no information about the secret even when they combine their shares <ref type="bibr" target="#b3">[3]</ref>.</p><p>Variants of secret sharing schemes abound in literature. These include the works of <ref type="bibr" target="#b4">[4]</ref>, <ref type="bibr" target="#b5">[5]</ref>, <ref type="bibr" target="#b6">[6]</ref>, <ref type="bibr" target="#b7">[7]</ref>, <ref type="bibr">[8]</ref>, <ref type="bibr" target="#b9">[9]</ref>, <ref type="bibr" target="#b10">[10]</ref> among others. Some applications of secret sharing schemes, which include private proximity testing and recursive information hiding, can be found in <ref type="bibr" target="#b11">[11]</ref> and <ref type="bibr" target="#b12">[12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Perfect -Threshold Scheme</head><p>A perfect threshold scheme is defined by <ref type="bibr" target="#b13">[13]</ref> as follows: Suppose that t and w are integers such that . A perfect -threshold scheme is a method of sharing a secret value among a finite set { } of participants in such a way that any participants can compute the value of but no group of (or fewer) participants can compute any information about the value of from the information they hold collectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Anonymous Threshold Schemes</head><p>Anonymous threshold schemes were first investigated by <ref type="bibr" target="#b14">[14]</ref>. In an anonymous threshold scheme, the secret can be reconstructed without knowledge of which participants hold which shares. The computation of the secret can be carried out by giving the shares to a black box that does not know the identities of the participants holding those shares, <ref type="bibr" target="#b15">[15]</ref>. According to <ref type="bibr" target="#b16">[16]</ref>, the scheme can be used to provide access to a secure area because security is provided without any need for a separate identification protocol. Ideal anonymous secret sharing schemes were investigated by <ref type="bibr" target="#b17">[17]</ref>. In this scheme, the size of the shares given to each participant is equal to the size of the secret. They also proved that an ideal anonymous -threshold scheme can be realized if and only if . The -threshold scheme was characterized by <ref type="bibr" target="#b18">[18]</ref> in terms of a regular difference family while <ref type="bibr" target="#b19">[19]</ref> constructed anonymous secret sharing schemes using combinatorial designs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.1">Definition: [13]</head><p>A perfect (t, w)-threshold scheme is an anonymous threshold scheme if the following two properties are satisfied: 1. the w participants receive w distinct shares, 2. the secret can be computed solely as a function of t shares, without the knowledge of which participant holds which share.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">BALANCED INCOMPLETE BLOCK DESIGNS (BIBD) 3.1 Definition: [3]</head><p>Let be positive integers such that . A BIBD is a pair such that:  is a set of elements called points  is a collection of subsets of called block  Each block contains exactly points  Every pair of distinct points is contained in exactly blocks</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Resolvable Balanced Incomplete Block Design (RBIBD)</head><p>3.2.1 Definition: <ref type="bibr" target="#b13">[13]</ref> Suppose is a -BIBD. A parallel class in is a subset of disjoint blocks from whose union is . A partition of into parallel classes is called a resolution, and is said to be a resolvable BIBD if has at least one resolution. In an RBIBD, each point occurs exactly one block in each part of the partition (or parallel class)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2">Necessary Conditions for the Existence of an RBIBD: [20]</head><p>  An example of a resolvable BIBD is the displayed in Table <ref type="table" target="#tab_0">1</ref>. Each column is a parallel class. The two System Analysts ensure that the students' registration details and results are correctly stored on the system. The program used for computing the results was developed by a trusted computer programmer who is not a member of the University community. The HOD, Examination Officer, the final year level adviser and the two system analysts were all trained to handle the program. Each of them is assumed to be trustworthy and each has individual password that give them access to the program. There is also a wireless intranet provision that allows these five members to connect their personal laptops to the main computer system and the result computation can only be done in the office where the main computer system is located. Any of these five members can therefore access the program and compute results, once he/she gains access to the Office.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">CONSTRUCTION OF (2, W) -ANONYMOUS THRESHOLD SCHEME FROM (v, b, r, w, 1)-RBIBD</head><p>The following illustration, from <ref type="bibr" target="#b13">[13]</ref> showed that -RBIBD can be used to construct anonymous (2, w)-threshold schemes. Suppose that is a , then there are parallel classes, , in the RBIBD. The Dealer chooses a secret value from a specified set of secrets . This implies that there are possible secrets to choose from. The Dealer shares the secret value among the set of participants with the assumption that . To share the secret K, gives some partial information, called a share, from a specified share set , to each of the participants. The share set has cardinality . (X, A) and its resolution are known to all the participants. To share secret , , chooses a random block and gives the points in to the participants, each of the participants receiving one point. Assume that any two participants with shares and want to obtain the secret, recall that (X, A) is a BIBD with λ = 1, then there is a unique block such that . Thus, the two shares can be used to find the parallel class that contains and the secret is revealed as . The scheme is anonymous because the computation of the secret depends on the shares and not on the identities of the shareholders. The security of the scheme is guaranteed because any one share cannot lead to the determination of the secret key to the program. Also, the authenticity, integrity and verifiability requirements for the scheme are satisfied since any two participants must submit their shares to the machine in order to have access to the program.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">THE RESULT PROCESSING SCHEME</head><p>was selected from a list of RBIBDs in <ref type="bibr" target="#b21">[21]</ref> because of its suitability to the application area. An algorithm with five cell executions was written in MATLAB to generate the parallel classes for . The steps taken in the generation of the parallel classes are illustrated with the aid of the workflow chart in Figure <ref type="figure" target="#fig_0">1</ref> while the parallel classes for the RBIBD are displayed in Table <ref type="table" target="#tab_1">2</ref>.  . This implies that there are possible secrets to choose from. shares the secret value among the set of participants with the assumption that . The share set has cardinality . The RBIBD and its resolution are known to the 7 participants. In sharing the secret , , chooses a random block and gives the points in to the participants, each of the participants receiving one point. Assume that any 2 of the 7 participants with shares and want to obtain the secret, recall that this RBIBD has its λ = 1, then there is a unique block such that . Thus, the parallel class that contains is determined and the secret is revealed as . The (2,7)-anonymous threshold scheme described above is applied as follows: Assume that a seven (7) member committee, , coordinates result-related issues for students in the Department. The committee comprises of the Head of Department (1), the Examination Officer (1), the Level Advisors (4) and the System Analyst <ref type="bibr" target="#b1">(1)</ref>. Assume that a trusted dealer , a third party outside the Department, wrote the computer program that computes students' results. To prevent unauthorized access to the program, he devised a Anonymous Scheme that allows at least any two of the seven member committee access to the program. shares the secret key among the committee members such that each member receives a distinct share and the identity of each shareholder is not linked to their respective shares. To reconstruct the secret, any two members submit their shares to the machine, the shares are kept secret by the machine, the secret key is obtained and access is thus provided to the two members. For example, if wants to share the secret key among the 7 participants, picks a random block in , (say {2 11 2 2 31 46 }). These are distributed to members of the committee in such a way that each member is not linked to their respective shares. Any two of the shares e.g. 2 and 2 can be used to reveal the secret. This is because the unique block containing 2 and 2 is {2 11 2 2 31 46 } and the parallel class that contains this block is . So, the secret is .</p><p>Since any one member cannot access the program to compute the students' results, the scheme ensures that the security requirements of authenticity, integrity and verifiability for the scheme are satisfied. Thus, the scheme is preferable to the one being used in the Department.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">CONCLUSION</head><p>Secret sharing schemes are used for increasing the security of important information. Different secret sharing schemes abound in literature one of which is Anonymous threshold scheme. In this paper, the (2,7) anonymous threshold scheme was constructed from the (49, 56, 8, 7, 1) RBIBD. The (2, 7) anonymous threshold scheme was then applied to Result Processing System in the Department of Statistics, University of Ibadan. The scheme developed satisfied the security requirements of authenticity, integrity and verifiability since a single participant cannot have access to the program used for computing the students' result. This makes the scheme better than the one currently being used in the Department.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Workflow chart for the construction of the Parallel Classes for (49, 56, 8, 7, 1) RBIBD</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>Result computation issues are highly sensitive matters in any University setting. In the Department of Statistics, University of Ibadan, result computation issues are handled through the collaborative efforts of eight out of the total population of staff members of the Department. They are the Head of Department (HOD), the Examination Officer, four Undergraduate Level Advisers and two System Analysts. The HOD is the overall Coordinator of result computation matters in the Department. The Level Advisers coordinate students' registration while the Examination Officer coordinates undergraduate students' examinations and receives examination results from course lecturers.</figDesc><table><row><cell></cell><cell>{1, 2, 3}</cell><cell cols="3">{1, 4, 7} {1, 5, 9} {1, 6, 8}</cell></row><row><cell></cell><cell>{4, 5, 6}</cell><cell cols="3">{2, 5, 8} {2, 6, 7} {2, 4, 9}</cell></row><row><cell></cell><cell>{7, 8, 9}</cell><cell cols="3">{3, 6, 9} {3, 4, 8} {3, 5, 7}</cell></row><row><cell>4.</cell><cell cols="2">OVERVIEW</cell><cell>OF</cell><cell>RESULT</cell></row><row><cell cols="3">COMPUTATION</cell><cell>PROCESS</cell><cell>IN</cell></row><row><cell cols="2">STATISTICS</cell><cell></cell><cell cols="2">DEPARTMENT,</cell></row><row><cell cols="4">UNIVERSITY OF IBADAN</cell></row></table><note>(9, 12, 4, 3, 1) RBIBD</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 : Parallel Classes for (49, 56, 8, 7, 1) RBIBD 43 17 33 35 11 22 9 5 14 23 47 37 43 34 31 30 34 2 45 29 8 17 8 45 42 9 10 12 36 15 3 14 49 20 38 28 13 18 24 31 1 3 42 13 7 47 28 23 16 22 27 49 4 30 35 39 24 37 44 10 19 1 6 25 20 2 21 6 15 16</head><label>2</label><figDesc></figDesc><table><row><cell>Read Standard BIBD</cell></row><row><cell>Extract RBIBD Based on its Conditions</cell></row><row><cell>Create Parallel Classes</cell></row><row><cell>Check for Uniqueness</cell></row><row><cell>Send to Excel</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 48 18 5 21 46 40 41 36 41 29 44 38 32 33 25 27 26 39 32 4 12 26 46 48 40 19 11 7 46 44 29 30 12 3 33 36 44 40 11 39 10 22 35 8 1 41 36 25 47 26 14 37 24 30 20 47 23 21 42 34 32 31 15 9 13 12 27 42 31 1 14 11 43 22 48 6 49 4 48 28 43 5 6 2 38 45 9 28 27 20 5 35 25 49 7 19 23 45 13 17 24 2 18 19 26 18 46 33 8 17 3 29 10 40 39 37 4 16 7 38 34 32 21 41 16 15 33 42 27 1 8 24 3 34 22 39 45 46 1 27 43 41 10 21 30 26 46 38 48 15 33 44 5 41 31 22 47 34 32 7 35 9 42 4 16 25 19 13 9 19 17 39 28 25 6 29 14 17 23 7 20 40 44 5 18 11 37 23 14 12 47 8 32 31 37 43 40 15 48 12 29 2 36 11 2 6 26 36 49 24 16 13 20 45 38 4 49 28 3 21 10 18 30 35 11 2 45 35 39 31 24 13 28 6 29 35 26 22 23 22 5 8 32 44 27 44 14 11 16 36 23 21 49 20 33 30 3 9 15 4 27 49 18 12 17 25 19 34 14 26 40 17 24 48 2 47 21 10 38 1 6 46 43 29 47 32 20 37 31 19 41 30 16 36 10 48 13 37</head><label>48</label><figDesc></figDesc><table><row><cell></cell><cell>9</cell><cell cols="3">5 34 33 46 38 1</cell><cell>40</cell></row><row><cell cols="2">12 28 15 4 41 7 42</cell><cell>25 39 7</cell><cell>8</cell><cell>3 43 45</cell></row><row><cell>The</cell><cell cols="4">RBIBD has point set X = {1, 2, 3,….., 49}</cell></row><row><cell>The</cell><cell cols="4">blocks are arranged into</cell></row><row><cell cols="2">parallel classes, denoted by</cell><cell></cell><cell></cell><cell>, as shown in Table 1</cell></row><row><cell>above.</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">Suppose a trusted Dealer</cell><cell cols="3">chooses a secret value</cell><cell>from a</cell></row><row><cell cols="2">specified set of secrets</cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">CoRI'16, Sept 7-9, 2016, Ibadan, Nigeria.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title/>
		<author>
			<persName><surname>References</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">How to share a secret</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shamir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communication of ACM</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="612" to="613" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Safeguarding cryptographic keys</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Blakley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AFIPS Conference Proceedings</title>
				<imprint>
			<date type="published" when="1979">1979</date>
			<biblScope unit="volume">48</biblScope>
			<biblScope unit="page" from="313" to="317" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Design Theory and Visual Cryptographic Schemes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Adhikari</surname></persName>
		</author>
		<ptr target="www.imbic.org/avishek.html" />
		<imprint>
			<date type="published" when="2013">2013</date>
			<pubPlace>Kolkata</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Department of Pure Mathematics, University of Calcutta</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">2,2)-Secret Sharing Scheme with Improved Share Randomness</title>
		<author>
			<persName><forename type="first">U</forename><surname>Mustafa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Rifat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Vasif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Guzin</surname></persName>
		</author>
		<idno>-1-4244-2881-6/08</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE</title>
		<imprint>
			<biblScope unit="volume">978</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A Novel Non-interactive Verifiable Secret Sharing Scheme</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Guisheng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Chunbo Ma, Communication Technology, ICCT&apos;06, International Conference</title>
				<meeting>Chunbo Ma, Communication Technology, ICCT&apos;06, International Conference</meeting>
		<imprint>
			<date type="published" when="2006-11-30">2006. 27-30 November, 2006</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Visual Secret Sharing For Multiple Secrets</title>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Tsai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="page" from="3572" to="3581" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Sharing Multiple Secrets Using Visual Cryptography</title>
		<author>
			<persName><forename type="first">J</forename><surname>Weir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Yan</surname></persName>
		</author>
		<idno>-1-4244-3828- 0/09</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE</title>
		<imprint>
			<biblScope unit="volume">978</biblScope>
			<biblScope unit="page" from="509" to="512" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A new efficient (t, n) Verifiable Multi-Secret Sharing (VMSS) based on YCH Scheme</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Cao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Mathematics and Computation</title>
		<imprint>
			<biblScope unit="volume">168</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="135" to="140" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Strong (n, t, n) verifiable secret sharing scheme</title>
		<author>
			<persName><forename type="first">L</forename><surname>Harn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">180</biblScope>
			<biblScope unit="page" from="3059" to="3064" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Secret Sharing Homomorphism and Secure E-voting</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">P</forename><surname>Binu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename><surname>Nair</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sreekumar</surname></persName>
		</author>
		<ptr target="https://arxiv.org/pdf/1602.05372" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Optimistic Fair Exchange with Multiple Arbiters</title>
		<author>
			<persName><forename type="first">A</forename><surname>Narayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Thiagarajan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lakhani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hamburg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Boneh</surname></persName>
		</author>
		<ptr target="https://eprint.iacr.org/2009/069.pdf" />
		<imprint>
			<date type="published" when="2009">2009</date>
			<pubPlace>Providence, RI, USA</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Brown University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Recursive Information Hiding in Visual Cryptography</title>
		<author>
			<persName><forename type="first">S</forename><surname>Katta</surname></persName>
		</author>
		<ptr target="https://arxiv.org/pdf/1004.4914" />
		<imprint>
			<date type="published" when="2010">2010</date>
			<pubPlace>Stillwater. OK</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Department of Computer Science, Oklahoma State University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Combinatorial Designs: Constructions and Analysis</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Stinson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Springer-Verlag New York, Inc</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A combinatorial approach to threshold schemes</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Stinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Vanstone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal of Discrete Mathematics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="230" to="236" />
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Anonymous Secret Sharing Schemes</title>
		<author>
			<persName><forename type="first">C</forename><surname>Blundo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Stinson</surname></persName>
		</author>
		<ptr target="citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.47.9460&amp;rep=rep1...pdf" />
		<imprint>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
	<note>Available Online</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">On the Bound for Anonymous Secret Sharing Schemes</title>
		<author>
			<persName><forename type="first">W</forename><surname>Kishimoto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Okada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kurosawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Ogata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">121</biblScope>
			<biblScope unit="page" from="193" to="202" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Strongly Ideal Secret Sharing Schemes</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Phillips</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Phillips</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Cryptology</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="185" to="191" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A combinatorial characterization of regular anonymous perfect threshold schemes</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Miao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Letters</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="page" from="131" to="135" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Deng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acta Mathematicae Applicatae Sinica, English Series</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="67" to="78" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Resolvable and Near-Resolvable Designs</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Abel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>. R, Ge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Combinatorial</title>
				<editor>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Designs</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Colbourn</surname></persName>
		</editor>
		<editor>
			<persName><surname>Dinitz</surname></persName>
		</editor>
		<meeting><address><addrLine>Boca Raton</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="124" to="132" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">2-(v, k, λ) Designs of Small Order</title>
		<author>
			<persName><forename type="first">R</forename><surname>Mathon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rosa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Combinatorial Designs</title>
				<editor>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Colbourn</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Dinitz</surname></persName>
		</editor>
		<meeting><address><addrLine>Boca Raton</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="25" to="58" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
