Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22 (11): 612-613.
[2]
Pieprzyk J, Zhang Xianmo. Constructions of cheating immune secret sharing, lecture notes in computer science//ICISC 2001. Berlin: Springer-Verlag, 2001: 226-243.
[3]
Pieprzyk J, Zhang Xianmo. On cheating immune secret sharing[J]. Discrete Mathematics and Theoretical Computer Science, 2004, 2(6): 253-264.
[4]
Zhang Jie, Chang Zuling, Wen Qiaoyan. Further results of cheating immune secret sharing[J]. The Journal of China Universities of Posts and Telecommunications, 2004, 11(4): 26-28.
[5]
张, 刘振华, 温巧燕. 欺骗免疫秘密共享[J]. 北京邮电大学学报, 2005, 28(4): 83-86. Zhang Jie, Liu Zhenhua, Wen Qiaoyan. Cheating immune secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(4): 83-86.
[6]
Pieprzyk J, Zhang Xianmo. Cheating prevention in secret sharing over GF(pt)//INDOCRYPT 2001. Berlin: Springer-Verlag, 2001: 79-90.
[7]
温巧燕, 钮心忻, 杨义先. 现代密码学中的布尔函数[M]. 北京: 科学出版社, 2000: 19-20. Wen Qiaoyan, Niu Xinxin, Yang Yixian. Boolean functions of modern cryptograph. Beijing: Science Press, 2000: 19-20.