Three useful threshold cryptography problems with efficient solutions