Blakley G R.Safeguarding cryptographickeys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,New York:1979.48:313-317.
[2]
Stinson D R.Cryptography Theory and Practice[M].3rd ed,UnitedStates:2009.
[3]
Massey J L.Some Applications of Coding Theory in Cryptography [M].Cryptography and Coding IV,England:Formara Ltd,1995:33-47.
[4]
Ding C S ,Jin Y.Covering and secret sharing with linear codes[A].Discrete Mathematics and Theoretical Computer Science:Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2003.2731:11-25.
[5]
Ding C S.The weight distribution of some irreducible cyclic codes[J].IEEE Trans Inform Theory,2009,55(3):955-960.
[6]
Shamir A.How to share a secret.Communications of the ACM[J].1979,24(11):612-613.
[7]
李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. Li D W,Yang G.Zhu L.An ID based verifiable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese)
[8]
Jin Y,Ding C S.Secret sharing schemes from three classes of linear codes[J].IEEE Trans.Inform.Theory,2006,52(1):206-212.
[9]
温晓军,田原,牛夏牧.一种基于秘密共享的量子强盲签名协议[J].电子学报,2010,38(3):720-724. Wen X J,Tian Y,Niu X M. A strong blind quantum signature protocol based on secret sharing[J].Acta Electronica Sinica,2010,38(3):720-724.(in Chinese)
[10]
Massey J L.Minimal codewords and secret sharing[A].The 6th Joint Swedish-Russian Workshop on Information Theory[C].Netherlands:Veldhoven,1993.276-279.
[11]
Li Z H ,Xue T,Lai H.Secret sharing schemes from binary linear codes[J].Information Science,2011,180(22):4412-4419.
[12]
Vega G,Wolfmann J.New classes of 2-weight cyclic codes[J].Designs,Codes and Cryptography,2007,42(3):327-334.