Abstract :
A general secret sharing scheme called an (l, p, r, n) secret sharing scheme and a model, called GS3 to emulate such a scheme are presented. The capacity of GS3 is derived and used to establish bounds on the (l, p, r, n) secret sharing scheme
Keywords :
cryptography; data privacy; (l, p, r, n) secret sharing scheme; GS3 model; bounds establishment; secret sharing model;