8 an important building block in our method is the use of secret sharing schemes that realize the access structures of quorum systems