Skip to main content
. 2020 Jun 18;20(12):3458. doi: 10.3390/s20123458
Algorithm 3: Linguistic threshold schemes.
Step 1. Defining (selecting) the service (or information specifying a given service) subject to the concealment process.
Step 2. Specifying important characteristic features of the concealed service:
  • linguistic description of a concealed set by means of a sequential/tree/graph formalism,

Step 3. Execution of the services sharing protocol:
  • specifying the type of division of the concealed services-equal/privileged allocation

  • selecting the (m, n)-threshold scheme,

  • specifying the n of all the protocol participants,

  • defining the m minimal number of shadows required to re-create the secret

Step 4. Execution of the services sharing protocol:
  • allocation shadows among all the protocol participants,

  • specifying the minimum number of shadows necessary to re-produce the shared information,

  • reproducing the concealed information by means of putting together the required number of shadows.