You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Benaloh and Leichter in \cite{benaloh1990generalized} introduced a different approach for secret sharing using a fully customizable access structure. In their scheme, the sets of players who receive the shares and later reconstruct the secret can be explicitly defined. These manually defined sets, so-called qualified subsets form an access structure. Obviously, this scheme can handle more complex business use cases.