“…Computational security for secret sharing schemes can be defined in more strong way [15]. It is based on the polynomial indistinguishability concept [16][17][18][19][20][21][22][23]. For any probability distribution ( , ), a secret sharing scheme is computationally secure if, for any pair of secrets (") , ($) and incomplete subsets of shares (") and ($) , the distributions N (") , (") V and N (") , (") Let = Pr N (") , (") V¡ = 1¡, = Pr N ($) , ($) V¡ = 1¡, = PrN N (") , (") V = 1V .…”