共 14 条
[1]
BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
[2]
BLAKLEY GR, 1979, P AM FED INF PROC 19, P313
[5]
Blundo C., 1995, LECT NOTES COMPUTER, V950, P35, DOI 10.1007/BFb0053422
[6]
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[7]
Brickell E. F., 1992, Journal of Cryptology, V5, P153, DOI 10.1007/BF02451112
[8]
Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
[9]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[10]
Ito M., 1987, PROC IEEE GLOBAL TEL, P99