The document introduces a dynamic and verifiable hierarchical secret sharing scheme designed to allow flexible management of shareholders and access conditions for secure vault operations. It outlines the mechanisms for adding, removing shareholders, and modifying access structures while ensuring perfect security and completeness. Key components include threshold signatures and Birkhoff interpolation for reconstructing the secret from shares held by authorized shareholders.