马文平,王新梅,多发送认证码的几个新构造方法,电子学报,2000,28(4),117-119.[2]R. Safvi-Naini, H. Wang, Multi-receiver authentication codes: models, bounds, constructions and extensions, Information and Computation, 1999, 151(1), 148-172.[3]Wakaha Ogata, Kaoru Kurosawa, Optimum secret sharing scheme secure against cheating, Advances in Cryptology-EUROCRYPT96, Lecture Notes in Computer Science, Springer-Verlag Heidelberg, 1996, Vol.1070, 200 211.[4]M. Atici.[J].D. R. Stinson, Universal hashing and multiple authentication. Advances in CryptologyCRYPTO96, Lecture Notes in Computer Science, New York, Springer, vol.110.1996,:-[5]Y. Desmedt.[J].Society and group oriented cryptography: A new concept, Advances in CryptologyCrypto87, Lecture Notes in Computer Science, Springer-Verlag, vol.57.1991,:-
|