共 12 条
[1]
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
[2]
Blakley G., Safeguarding cryptographic keys, Proc. of the American Federation of Information Processing Societies Conf. (AFIPS'79), pp. 313-317, (1979)
[3]
Fei R.C., Wang L.N., Cheat-Proof secret share schemes based on RSA and one-way function, Journal of Software, 14, 1, pp. 146-150, (2003)
[4]
Li H.X., Pang L.J., Cai W.D., An efficient threshold multi-group-secret sharing scheme, Proc. of the 2nd Int'l Conf. of Fuzzy Information and Engineering (ICFIE 2007), pp. 911-918, (2007)
[5]
Pang L.J., Wang Y.M., (t, n) threshold secret sharing scheme based on RSA cryptosystem, Journal of Communications, 26, 6, pp. 70-73, (2005)
[6]
Hwang R.J., Chang C.C., An on-line secret sharing scheme for multi-secrets, Computer Communications, 21, 13, pp. 1170-1176, (1998)
[7]
Zhu Y., Yang Y.T., Sun Z.W., Feng D.G., Ownership proofs of digital works based on secure multiparty computation, Journal of Software, 17, 1, pp. 157-166, (2006)
[8]
Hwang R.J., Lai C.H., Su F.F., An efficient signcryption scheme with forward secrecy based on elliptic curve, Applied Mathematics and Computation, 167, 1, pp. 870-881, (2005)
[9]
Zheng Y., Digital signcryption or how to achieve cost (signature and encryption)<<cost(signature)+cost(encryption), Kaliski B, ed. Proc. of the Advances in Cryptology (CRYPTO'97), pp. 165-179, (1997)
[10]
Shamir A., Identity-Based cryptosystems and signature schemes, Proc. of the Advances in Cryptology (CRYPTO'84), pp. 47-53, (1984)