“…Existing FSS solutions are not as flexible and versatile as the various secret sharing schemes [15], which provide enhanced privacy [98,96,103,88,23,74,89,94], refreshable shares [84,65,55,110,83], ability to share multiple secrets simultaneously [109,24], verifiable shares and secrets [105,80,44,38,43,19,53,61,87,91,57,14,68,42,12,102], flexibility in sharing/reconstruction procedures and size of the shares [99,66,37,67,101,77,11,22,41,47,48,106]. Its extensive flavors have enabled secret sharing to have applications in a multitude of areas, including threshold cryptography [49], (secure) multiparty computation [19,…”