A. Shamir , How to share a secret, Commun. ACM, 1979, 22(11), 612-613.[2]G.R. Blackley, Safeguarding cryptographic keys, Proc. Nat. Computer Conf. AFIPS Conf.Proc., USA, 1979, 313-317.[3]E.D. Karnin, J. W. Green, M. E. Hellman, On secret sharing systems, IEEE Trans. on IT, 1983,24(1), 231-241.[4]He. J., E. Dawson, Multistage secret sharing based on one-way function, Electron. Lett., 1994,30(19), 1591-1592.[5]L. Harn, Comment: Multistage secret sharing based on one-way function, Electron. Lett., 1995,31, (4), 262-263.[6]刘焕平,杨义先,杨放春,基于单向函数的多级密钥共享方案,电子科学学刊,1999,21(4),561-564.[7]R.G.E.Pinch,Online multiple secret sharing,Electron.Lett.,1996,32(12),1087-1088.[8]谭凯军,诸鸿文,基于单向函数的动态秘密分享机制,通信学报,1999,20(7),81-84.
|