共 13 条
[1]
Shamir A., How to share a secret, Communications of the ACM, 22, 1, pp. 612-613, (1979)
[2]
Blakeley G.R., Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313-317, (1979)
[3]
Chor B., Goldwasser S., Micali S., Verifiable secret sharing and achieving simultaneity in the presence of faults, Proceedings of the 26th Annual Symposium on Foundations of Computer Science, pp. 383-395, (1985)
[4]
Feldman P., A practical scheme for non-interactive verifiable secret sharing, Proceedings of the 28th IEEE Symp. On Foundations of Comp, Science (FOCS'87), pp. 427-437, (1987)
[5]
Pedersen T.P., Distributed provers with applications to undeniable signatures, Proceedings of Eurocrypt'91, pp. 221-238, (1991)
[6]
Lin H.Y., Harn L., Fair reconstruction of a secret, Information Processing Letters, 55, 1, pp. 45-47, (1995)
[7]
Pang L., Liu Y., Wang Y., An efficient (t, n) threshold multi-secret sharing scheme, Acta Electroncia Sinica, 34, 4, pp. 585-589, (2006)
[8]
Halpern J., Teague V., Rational secret sharing and multiparty computation, Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC), pp. 623-632, (2004)
[9]
Kol G., Naor M., Games for exchanging information, Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC), pp. 423-432, (2008)
[10]
Maleka S., Amjed S., Rangan C.P., Rational secret sharing with repeated games, 4th Information Security Practice and Experience Conference, pp. 334-346, (2008)