Threshold Schemes for Cryptographic Primitives