“…Gcd-based attacks were first discovered in [24] whereas compromised cloud servers are able to retrieve the distribution vector X, by recovering each of the individual reconstruction element x i based on the shares they received. It has been claimed in [24] that, subtracting any two shares that are associated with the same secret will result in a multiple of the reconstruction element x i . To see this, readers can refer to Equation ( 5) below, where (c vn * x i + v) is the share generated from the secret v for an n-th time and (c vm * x i + v) is the share for an m-th time.…”