Algorithm 2: Division of the secret set |
Step 1. Obtaining the information set. Step 2. Assessment, which information from the obtained set are strategic/secret and are subject to the concealment procedure:
-
—
obtaining the secret data from the entire data set,
-
—
removing insignificant data or using them to ‘distort’ the meaning of the important information.
Step 3. Obtaining the secret data set. Step 4. Specifying the important features of the concealed data:
-
—
in the case of specifying secret data with homogeneous meaning, it is possible to introduce a similar/joint linguistic description for such data,
-
—
in the case of data with various meanings, the introduction of independent linguistic descriptions for individual secrets,
-
—
impact assessment of the concealed secret on the internal and external situation of the entity who has the secret.
Step 5. Selection of the secret-sharing protocol:
-
—
specifying the type of secret sharing-equal/privileged allocation,
-
—
specifying the required number of protocol participants.
Step 6. Execution of the secret-sharing protocol:
-
—
allocation of shadows to protocol participants,
-
—
putting together the required number of shadows to re-produce the secret.
|