Return to Article Details Group Authentication Using Threshold Secret Sharing Download Download PDF