Text this: Constructing secret sharing schemes based on cyclic