共 20 条
- [1] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
- [2] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
- [4] Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
- [5] Carpentieri M., 1995, Designs, Codes and Cryptography, V5, P183, DOI 10.1007/BF01388382
- [6] CARPENTIERI M, 1993, LNCS, V765, P118
- [7] Efficient cheater identification method for threshold schemes [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 23 - 27
- [8] Chor B., 1985, P 26 IEEE S FDN COMP, P383
- [10] Ito M., 1993, Journal of Cryptology, V6, P15, DOI 10.1007/BF02620229