Shamir A. How to share a secret. Communications of theACM, 1979, 22(11): 612-613.[2]Blakley G R. Safeguarding cryptographic keys [C].Proceedings of the National Computer Conference, 1979, 48:242-268.[3]Naor M and Shamir A. Visual cryptography[J].Advances inCryptology-Eurocrypt94, Lecture Notes in ComputerScience.1995, Vol.950:1-12[4]颜浩, 甘志, 陈克非.可防欺骗的可视密码分享方案[J]. 上海交通大学学报, 2004, 38(1): 107-110.Yan Hao, Gan Zhi, and Chen Ke-fei. A cheater detectablevisual cryptography scheme [J]. Journal of Shanghai JiaotongUniversity, 2004, 38(1): 107-110.[5]郭洁, 颜浩, 刘妍, 陈克非. 一种可防止欺骗的可视密码分享方案[J]. 计算机工程, 2005, 31(6): 126-128.Guo Jie, Yan Hao, Liu Yan, and Chen Ke-fei. A cheaterdetectable visual cryptography scheme [J]. ComputerEngineering, 2005, 31(6): 126-128.[6]徐晓辉, 郁滨. 无重影的可防欺骗视觉密码方案[C]. 计算机技术与应用进展(CACIS.2007)2007: 1335-1339.Xu Xiao-hui and Yu Bin. A Cheater Detectable VCS withoutFringes [C]. Progress of Computer Technology andApplication in 2007 (CACIS.2007) 2007: 1335-1339.[7]Yu Bin, Xu Xiao-hui, and Fang Li-guo. Multi-secret sharingthreshold visual cryptography [C]. CIS Workshops 2007,Harbin, 2007: 815-818.[8]Ateniese G, Blundo C, De Santis A, and Stinson D R. Visualcryptography for general access structures[J].Information andComputation.1996, 129:86-106[9]Ateniese G, Blundo C, De Santis A, and Stinson D R.Extended capabilities for visual cryptography. TheoreticalComputer Science, 2001, 250: 143-161.[10]郁滨, 房礼国. 外形比例不失真的可视门限方案的研究[J]. 计算机工程与设计, 2006, 27(11): 1998-1999, 2014.Yu Bin and Fang Li-guo. Research on aspect ratio invariantvisual threshold scheme [J]. Computer Engineering andDesign, 2006, 27(11): 1998-1999, 2014.
|