Ideal secret sharing schemes with multiple secrets | doi.page