A. Shamir , How to share a secret, Communications of the ACM, 1979, 22(11), 612-613.[2]G.R. Blakley, Safeguarding cryptographic keys, In Proc. of the AFIPS 1979 National Computer Conference, New York, June 1979, vol.48, 313-317.[3]Wakaha Ogate.[J].Karu Kurosawa, Optimum secret sharing scheme secure against cheating, EUROCRYPT96 Proceedings, Berlin Heidelberg, Springer-Verlag.1996,:-Markus Stadler.[J].Publicly verifiable secret sharing, EURO-CRYPT96 Proceedings, Berlin Heidelberg, Springer-Verlag.1996,:-[4]张建中,谢淑翠,一个新的可防止欺诈的动态秘密共享方案,密码学进展,CHINACRYPT2000,北京,科学出版社,2000,108-111.[5]卢建朱,陈火炎,具有(t,n)共享验证的认证加密方案及其安全性,计算机研究与发展,2001,38(9),1042-1054.[6]冯登国,裴定一,密码学导引,北京,科学出版社,1999,166-167.
|