CHOR B,GOLDWASSER S,MICAL S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]∥Proc of IEEE FOCS 85.New York:IEEE Press,1985:383-395.
[2]
PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]∥Proceeding of the 11thAnnual International Cryptology Conference.London:Springer-Verlag,1991,576:129-139.
[3]
GENNARO R,RABIN M,RABIN T.Simplified VSS and fast-track multiparty computations with applications to thresholdcryptography[C]∥Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing.NewYork:ACM Press,1998:101-111.
ASAEDA H,RAHMAN M,TOYAMA Y.Structuring proactive secret sharing in mobile ad-hoc networks[C]∥InternationalSymposium on Wireless Pervasive Computer(ISWPC).Phuket,Thailand:IEEE,2006:1-6.
[6]
高照锋,叶延风,庄毅.基于椭圆曲线密码体制的先应式秘密共享方案[J].计算机技术与发展,2007,17(7):131-134.GAO Zhao-feng,YE Yan-feng,ZHUANG Yi.A proactive secret sharing scheme based on the elliptic curve cryptosystem[J].Computer Technology and Development,2007,17(7):131-134.(in Chinese)
[7]
HERZBERG A,JARECKI S,KRAWCZYK H.Proactive secret sharing or:how to cope with perpetual leakage[C]∥Coppersmith Advances in Cryptology CRYPTO 95.Berlin:Springer Verlag,1995:339-352.
[8]
石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报:自然科学版,2006,29(2):163-168.SHI Run-hua,HUANG Liu-sheng.A new threshold secret sharing scheme[J].Journal of Hefei University of Technology:Natural Science,2006,29(2):163-168.(in Chinese)