1 |
Shamir A . How to share a secret. Communications of the ACM, 1979,24(11): 612~613
|
2 |
Blakley G . Safeguarding cryptographic key. Proceedings of AFIPS 1979 National Computer Conference, New York,USA, 1979: 313~317
|
3 |
Iuon-Chang L . A (t,n)threshold secret sharing system with efficient identification of cheaters. Computing and Informatics, 2005,24(12): 529~541
|
4 |
Gyan S Y , Aparajita O . A novel multi secret sharing scheme based on bit plane flips and Boolean operations. Proceedings of the 48th Annual Convention of Computer Society, Jabalur,India, 2014: 765~772
|
5 |
Asmuth C , Bloom J . A modular approach to key safeguarding. IEEE Transactions on Information Theory, 1983,30(2): 208~210
|
6 |
Karnin E D , Greene J W , Hellman M E . On sharing secret systems. IEEE Transactions on Information Theory, 1983,29(1): 3~41
|
7 |
李慧贤, 庞辽军 . 基于双线性变换的可证明安全的秘密共享方案. 通信学报, 2008,29(10):45~50 Li H X , Pang L J . Provably secure secret sharing scheme based on bilinear maps. Journal on Communications, 2008,29(10):45~50
|
8 |
石润华, 黄刘生, 杨威 等. 新型有效的秘密共享方案. 通信学报, 2012,33(1):10~16 Shi R H , Huang L S , Yang W , et al. Novel and effective secret sharing scheme. Journal on Communications, 2012,33(1):10~16
|
9 |
宋云, 李志慧, 李永明 . 基于极小线性码上的秘密共享方案. 电子学报, 2013,41(2):220~226 Song Y , Li Z H , Li Y M . Secret sharing schemes based on minimal linear codes. Acta Electronica Sinica, 2013,41(2):220~226
|
10 |
于佳, 陈养奎, 郝蓉 等. 无可信中心的可公开验证多秘密共享. 计算机学报, 2014,37(5):1030~1038 Yu J , Chen Y K , Hao R , et al. Publicly verifiable multi-secret sharing without trusted centers. Chinese Journal of Computers, 2014,37(5):1030~1038
|
11 |
殷凤梅, 侯整风, 濮光宁 等. (t,n)门限追踪匿名认证方案. 计算机工程, 2015,41(5):149~152 Yin F M , Hou Z F , Pu G N , et al. (t,n)threshold tracing anonymous authentication scheme. Computer Engineering, 2015,41(5):149~152
|
12 |
荣辉桂, 莫进侠, 常炳国 等. 基于Shamir 秘密共享的密钥分发与恢复算法. 通信学报, 2015,36(3):60~69 Rong H G , Mo J X , Chang B G , et al. Key distribution and recovery algorithm based on Shamir's secret sharing. Journal on Communications, 2015,36(3):60~69
|