共 18 条
[1]
Shamir A., How to Share a Secret, Communications of the ACM, 22, pp. 612-613, (1979)
[2]
Blakley G., Safeguarding Cryptographic Keys, 48, pp. 313-317, (1979)
[3]
Benaloh J., Leichter J., Generalized Secret Sharing and Monotone Functions, 403, pp. 27-35, (1988)
[4]
Hwang R.-J., Chang C.-C., An On-line Secret Sharing Scheme for Multi-secrets, Computer Communications, 21, 13, pp. 1170-1176, (1998)
[5]
Pang L.-J., Li H.-X., Wang Y.-M., A Secure and Efficient Secret Sharing Scheme With General Access Structures, 4223, pp. 646-649, (2006)
[6]
Al-Riyami S.S., Paterson K.G., Certificateless Public Key Cryptography, 2894, pp. 452-474, (2003)
[7]
Shamir A., Identity-based Cryptosystems and Signature Schemes, 196, pp. 47-53, (1984)
[8]
Boneh D., Franklin M., Identity-based Encryption From the Weil Pairing, 2139, pp. 213-229, (2001)
[9]
Adams C., Lloyd S., Understanding Public-Key Infrastructure--Concepts, Standards, and Deployment Considerations, Indianapolis, (1999)
[10]
Sang Y., You L., A New Certificateless Self-identifiable Ring Signature Scheme, 7, pp. 2816-2819, (2010)