A construction method of secret sharing schemes based on authorized subsets | IEEE Conference Publication | IEEE Xplore