Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes