[1] |
SHAMIR A . How to share a secret[J]. Communication ACM, 1979,22(11): 612-613.
|
[2] |
BLAKLEY G R , . Safeguarding cryptographic keys[C]// IEEE Computer Society. 1979:313.
|
[3] |
ASMUTH C , BLOOM J . A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983,29(2): 208-210.
|
[4] |
KARNIN E D , GREENE J , HELLMAN M E . On secret sharing systems[J]. IEEE Transactions on Information Theory, 1983,29(1): 35-41.
|
[5] |
CHOR B , GOLDWASSER S , MICALI S ,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[C]// Symposium on Foundations of Computer Science. 2008: 383-395.
|
[6] |
LIU C J , LI Z H , BAI C M ,et al. Quantum-secret-sharing scheme based on local distinguishability of orthogonal seven-qudit entangled states[J]. International Journal of Theoretical Physics, 2018,57(3): 1-15.
|
[7] |
XU T T , LI Z H , BAI C M ,et al. A new improving quantum secret sharing scheme[J]. International Journal of Theoretical Physics, 2017,56: 1-10.
|
[8] |
SINGH N , TENTU A N , BASIT A ,et al. Sequential secret sharing scheme based on Chinese remainder theorem[C]// IEEE International Conference on Computational Intelligence and Computing Research. 2017: 1-6.
|
[9] |
SONG Y , LI Y , WANG W . Multiparty quantum direct secret sharing of classical information with bell states and bell measurements[J]. International Journal of Theoretical Physics, 2018,57(5): 1559-1571.
|
[10] |
PILARAM H , EGHLIDOS T , PILARAM H ,et al. A lattice-based changeable threshold multi-secret sharing scheme and its application to threshold cryptography[J]. Scientia Iranica, 2017,24(3): 1448-1457.
|
[11] |
BASIT A , KUMAR N C , VENKAIAH V C ,et al. Multi-stage multi-secret sharing scheme for hierarchical access structure[C]// International Conference on Computing,Communication and Automation. 2017: 556-563.
|
[12] |
ZHANG T , KE X , LIU Y . (t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme[J]. Eurasip Journal on Wireless Communications & Networking, 2018,2018(1): 7-1.
|
[13] |
YUAN D , HE M , ZENG S ,et al. (t,p)-threshold point function secret sharing scheme based on polynomial interpolation and its application[C]// IEEE/ACM International Conference on Utility and Cloud Computing. 2017: 269-275.
|
[14] |
李滨 . 基于特殊访问权限的差分秘密共享方案[J]. 四川大学学报(自然科学版), 2006(1): 78-83.
|
|
LI B . Differential secret sharing scheme based on special accesspermissions[J]. Journal of Sichuan University (Natural Science Edition), 2006(1): 78-83.
|
[15] |
同济大学数学系编.工程数学线性代数[M]. 北京: 高等教育出版社, 2014.
|
|
School of Mathematic Sciences,Tongji University. Engineering mathematics,linear algebra[M]. Beijing:Higher Education Press. 2014.
|
[16] |
曹尔强, 张沂, 曹晔 ,等. “软件黑盒子”文件加锁和加密的一个方法[J]. 长春邮电学院学报, 1991(3): 11-14.
|
|
CAO E Q , ZHANG Y , CAO Y ,et al. A technique of locking a disk and secreting a whole disk[J]. Journal of Changchun Post & Telecommunication Institute, 1991(3): 11-14.
|