Secret sharing -- Part 2: Fundamental mechanisms