Shamir A. How to share a secret[J]. Communication of the ACM, 1979, 22(11): 612-613.
[2]
Blakley G. Safeguarding cryptographic keys//Proc AFIPS 1979 NCC. New York: AFIPS Press, 1979: 313-317.
[3]
张劼, 刘振华, 温巧燕. 严格k-欺骗免疫秘密共享[J]. 北京邮电大学学报, 2007, 30(2): 24-27. Zhang Jie, Liu Zhenhua, Wen Qiaoyan. Strictly k-cheating immune secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(2): 24-27.
[4]
Dong Y, Go H W, Sui A F, et al. Providing distributed certificate authority service in mobile ad hoc networks//SecureComm 2005. Athens: , 2005: 149-156.
[5]
于佳, 郝容, 孔凡玉, 等. 先动的可公开验证服务器辅助秘密共享[J]. 北京邮电大学学报, 2008, 31(5): 13-17. Yu Ja, Hao Rong, Kong Fanyu, et al. Proactive and publicly verifiable server-assisted secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 13-17.
[6]
Chang T Y, Hwang M S, Yang W P. A new multi-stage secret sharing scheme using one-way function[J]. Association for Computing Machinery, 2005, 39(1): 48-55.
[7]
Chang T Y, Hwang M S, Yang W P. An improvement on the Lin-Wu (t,n)-threshold verifiable multi-secret sharing scheme[J]. Applied Mathematics and Computation, 2005, 163(1): 169-178.
[8]
Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries//FC 2000. Berlin: Springer Verlag, 2000: 90-94.
[9]
Ray I, Narasimhamurthi N. An anonymous electronic voting protocol for voting over the Internet//WECWIS01. Los Alamitos: IEEE Computer Society, 2001: 188-190.
[10]
Geng Yongjun, Fan Xiahong, Hong Fan. A new multi-secret sharing scheme with multi-policy//ICACT07. Phoenix Park: National Computerization Agency, 2007: 1515-1517.
[11]
Lin Hanyu, Yeh Y S. Dynamic multi-secret sharing scheme[J]. International Journal of Contemporary Mathematical Sciences, 2008, 3(1): 37-42.