[1] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11):612-613.
|
[2] |
BLAKLEY G R . Safeguarding cryptographic keys[A]. Managing Requirements Knowledge, International Workshop[C].IEEE Computer Society, 1979.313-313.
|
[3] |
肖清华 . 秘密共享及相关应用研究[D]. 杭州:浙江大学, 2005. XIAO Q H . Research on Secret Sharing and Its Related Applications[D]. Hangzhou: Zhejiang University, 2005.
|
[4] |
CHOR B , GOLDWASSER S , MICALI S , et al. Verifiable secret shar-ing and achieving simultaneity in the presence of faults[A]. 2013 IEEE 54th Annual Symposium on Foundations of Computer Science[C]. 1985.383-395.
|
[5] |
KAYA K , SEL?UK A A . A verifiable secret sharing scheme based on the Chinese remainder theorem[A]. Progress in Cryptology- IN-DOCRYPT 2008[C]. Springer Berlin Heidelberg, 2008.414-425.
|
[6] |
LU Q , XIONG Y , HUANG W , et al. A distributed ECC-DSS authenti-cation scheme based on CRT-VSS and trusted computing in MANET[A]. Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference[C]. 2012.656-665.
|
[7] |
KAYA K , SEL?UK A A . A verifiable secret sharing scheme based on the chinese remainder theorem[A]. Progress in Cryptology-INDOCRYPT 2008[C]. Springer Berlin Heidelberg, 2008.414-425.
|
[8] |
HARN L , FUYOU M , CHANG C C . Verifiable secret sharing based on the Chinese remainder theorem[J]. Security and Communication Networks, 2014,7(6):950-957.
|
[9] |
ZHANG L , GUO F , LIU S , et al. A verifiable multi-secret sharing scheme based on LUC cryptosystem[A]. Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on IEEE[C]. 2011.2905-2908.
|
[10] |
HU C , LIAO X , CHENG X . Verifiable multi-secret sharing based on LFSR sequences[J]. Theoretical Computer Science, 2012,445:52-62.
|
[11] |
LAIH C S , HARN L , LEE J Y , et al. Dynamic threshold scheme based on the definition of cross-product in an n-dimensional linear space[A]. Advances in Cryptology—CRYPTO'89 Proceedings[C]. Springer New York, 1990.286-298.
|
[12] |
李大伟, 杨庚 . 基于单向散列链的可更新(t,n)门限秘密共享方案[J]. 通信学报, 2010,31(7):128-135. LI D W , YANG G . Renewable (t, n) threshold secret sharing scheme based on one-way hash chain[J]. Journal on Communications, 2010,31(7):128-135.
|
[13] |
LIN H Y , YEH Y S . Dynamic multi-secret sharing scheme[J]. International Journal of Contemporary Mathematical Sciences, 2008,3(1):37-42.
|
[14] |
QU J , ZOU L , ZHANG J . A practical dynamic multi-secret sharing scheme[A]. Information Theory and Information Security (ICITIS), 2010 IEEE International Conference[C]. 2010.629-631.
|
[15] |
TADAYON M H , KHANMOHAMMADI H , ARABI S . An attack on a dynamic multi-secret sharing scheme and enhancing its security[A]. Electrical Engineering (ICEE), 2013 21st Iranian Conference[C]. 2013.1-5.
|
[16] |
贾秀芹, 赖红 . 抗欺诈的动态(t, n)门限秘密共享方案[J]. 计算机工程, 2011,37(4):152-154. JIA X Q , LAI H . Anti-cheat and dynamic (t, n) threshold secret sharing scheme[J]. Computer Engineering, 2011,37(4):152-154.
|
[17] |
ESLAMI Z , RAD S K . A new verifiable multi-secret sharing scheme based on bilinear maps[J]. Wireless Personal Communications, 2012,63(2):459-467.
|
[18] |
HERZBERG A , JARECKI S , KRAWCZYK H , et al. Proactive secret sharing or: How to cope with perpetual leakage[A]. Advances in Cryptology—CRYPT0'95[C].Springer Berlin Heidelberg, 1995.339-352.
|
[19] |
SUN H , ZHENG X , YU Y . A proactive secret sharing scheme based on elliptic curve cryptography Education Technology and Computer Science[A]. First International Workshop on IEEE[C]. 2009.666-669.
|
[20] |
WANG X . A novel adaptive proactive secret sharing without a trusted party[J]. IACR Cryptology ePrint Archive, 2011,241.
|
[21] |
范畅, 茹鹏 . 一种基于 ECC 的动态秘密共享方案[J]. 计算机仿真, 2012,29(12):131-134. FAN C , RU P . Proactive secret sharing scheme based on ECC[J]. Computer Simulation, 2012,29(12):131-134.
|
[22] |
NIKOV V , NIKOVA S . On a relation between verifiable secret sharing schemes and a class of error-correcting codes[A]. Coding and Cryp-tography[C].Springer Berlin Heidelberg, 2006.275-290.
|
[23] |
OGATA W , KUROSAWA K , STINSON D R . Optimum secret sharing scheme secure against cheating[J]. SIAM Journal on Discrete Mathematics, 2006,20(1):79-95.
|
[24] |
JHANWAR M P , SAFAVI-NAINI R . On the share efficiency of robust secret sharing and secret sharing with cheating detection[A]. Progress in Cryptology-INDOCRYPT 2013[C]. Springer International Publishing, 2013.179-196.
|
[25] |
BENALOH J C . Secret sharing homomorphisms: Keeping shares of a secret secret[A]. Advances in Cryptology—CRYPTO'86[C].Springer Berlin Heidelberg, 1987.251-260.
|