Skip to main content
. 2020 Jun 18;20(12):3458. doi: 10.3390/s20123458
Algorithm 1: Dividing a single secret
Step 1. Obtaining the secret information.
Step 2. Specifying the important features of the concealed secret:
  • linguistic description of the concealed information meaning,

  • impact assessment of the concealed secret on the internal and external situation of the entity who has the secret.

Step 3. Selection of secret-sharing protocol:
  • specifying the type of secret sharing–equal/privileged allocation

  • specifying the required number of protocol participants, dependent on the type of secret sharing applied.

Step 4. Execution of the secret-sharing protocol:
  • allocation of shadows to protocol participants,

  • putting together the required number of shadows to re-produce the secret.