Algorithm 1: Dividing a single secret |
Step 1. Obtaining the secret information. Step 2. Specifying the important features of the concealed secret:
-
—
linguistic description of the concealed information meaning,
-
—
impact assessment of the concealed secret on the internal and external situation of the entity who has the secret.
Step 3. Selection of secret-sharing protocol:
-
—
specifying the type of secret sharing–equal/privileged allocation
-
—
specifying the required number of protocol participants, dependent on the type of secret sharing applied.
Step 4. Execution of the secret-sharing protocol:
-
—
allocation of shadows to protocol participants,
-
—
putting together the required number of shadows to re-produce the secret.
|