共 7 条
- [1] Wang F., Gu L., Zheng S., Et al., A verfiable multi-policy secret sharing scheme, Journal of Beijing University of Posts and Telecommunications, 33, 6, pp. 72-75, (2010)
- [2] Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
- [3] Blakley G.R., Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313-317, (1979)
- [4] Chang T., Hwang M., Yang W., An improvement on the Lin-Wu(t, n) threshold verifiable multi-secret sharing scheme, Applied Mathematics and Computation, 163, 1, pp. 169-178, (2005)
- [5] Eslami Z., Ahmadabadi J.Z., A verifiable multi-secret sharing scheme based on cellular automata, Information Sciences, 180, 15, pp. 2889-2894, (2010)
- [6] Olimid R.F., Dealer-leakage resilient verifiable secret sharing, (2014)
- [7] Jun S., Efficient verifiable multi-secret sharing scheme based on Hash function, Information Sciences, 278, 9, pp. 104-109, (2014)