共 19 条
[1]
Benaloh J., 1989, COMMUNICATION
[2]
BENALOH JC, 1990, LECT NOTES COMPUT SC, V403, P27
[3]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]
Blundo C, 1992, ADV CRYPTOLOGY CRYPT, P148
[5]
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[6]
Brickell E.F., 1989, J COMBIN MATH COMBIN, V6, P105
[7]
Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
[8]
Ito M., 1987, IEEE GLOBAL TELECOMM, P99
[9]
JACKSON W, UNPUB IDEAL SECRET S
[10]
KARCHMER M, 1988, 20TH P ANN ACM S THE, P539