Coding theorems for a (2, 2)-threshold scheme secure against impersonation by an opponent | IEEE Conference Publication | IEEE Xplore