The approach we consider is different from the traditional
secret sharing problem. In secret sharing, a trusted central
authority (sometimes a multimedia server) shares a single
secret for many users. Here, unconditional secrecy
is achieved through the server’s use of hash
functions for share generation that are known
only to the server; not even the users can access
the share.