“…Here we show that the proposed secret sharing scheme is perfect. Following Chaudhry et al 3 and Song et al,
34 let
be a finite set of participants and
be an access structure over
, that is, each
is a subset of
Let critical set
of a GS r ( v ; k ) be the secret where
.…”