共 43 条
[1]
Shamir A(1979)How to share a secret Communications of the ACM 22 612-613
[2]
Harn L(2010)Authenticated group key transfer protocol based on secret sharing IEEE Transactions on Computers 59 842-846
[3]
Lin C(2011)Identity-based key distribution for mobile Ad Hoc networks Frontiers of Computer Science 5 442-447
[4]
Lv X(1994)Group-oriented ( IEE Proceedings-Computers and Digital Techniques 141 307-313
[5]
Li H(2004)) threshold digital signature scheme and digital multisignature Journal of Information and Computational Science 1 259-262
[6]
Wang B(2015)Simple secret sharing and threshold RSA signature schemes Journal of Cryptology 28 49-109
[7]
Harn L(2015)Efficient asynchronous verifiable secret sharing and multiparty computation Frontiers of Computer Science 9 778-787
[8]
Tang S(2019)The optimal information rate for graph access structures of nine participants Information Sciences 473 13-30
[9]
Patra A(1981)A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem Communications of the ACM 24 583-584
[10]
Choudhury A(1983)On sharing secrets and Reed-Solomon codes IEEE Transactions on Information Theory 29 208-210