Blakley G R. Safeguarding cryptographic keys//Merwin RE, Zanca JT, Smith M, et al. Proceedings of American Federation of Information Processing Societes Conference, 1979 National Computer Conference. Montvale: AFIPS, 1979: 313-317.
[2]
Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 24(11): 612-613.
[3]
He J,Dawson E. Multi stage secret sharing based on one way function[J]. Electronics Letters,1994,30(19): 1591-1592.
[4]
He J,Dawson E. Multi-secret sharing scheme based on one way function. Electronics Letters,1995,31(2): 93-95.
[5]
Ham L. Comment:multi stage secret sharing based on one-way function. Electronics Letters,1995,31(4): 262-263.
[6]
Ham L. Efficient sharing of multiple secrets[J]. IEEE Proceedings Computers and Digital Techniques,1995,142(3):237-240.
[7]
庞辽军, 柳毅, 王育民. 一个有效的(t,n)门限多重秘密共享体制. 电子学报, 2006, 34(4): 587-589. Pang Liaojun, Liu Yi, Wang Yumin. An efficient (t,n) threshold multi-secret sharing scheme[J]. Acta Electronica Sinica, 2006, 34(4): 587-589.
[8]
Wang Mingsheng, Liu Zhuojun, Zhang Yanshuo. Secret sharing among weighted participants[J]. Journal of Beijing Electonic Science and Technology Institute, 2005, 13(2): 1-8.
[9]
李滨. 基于特殊访问权限的差分秘密共享方案[J]. 四川大学学报(自然科学版), 2006, 43(1): 78-83. Li Bin. Difference secret Sharing scheme based on special access right[J]. Journal of Sichuan University (Natural Science),2006, 43(1): 78-83.
[10]
Fouque P A, Poupard G, Sten J. Sharing description in the context of voting or lotteries//Proceedings of Financial Cryptography 2000. Berlin: Springer-Verlag, 2000: 90-104.