共 31 条
- [1] Al Mahmoud Q(2013)Polynomial differential-based strong (n, t, n)-verifiable secret sharing IET Inf Secur 7 312-317
- [2] Asmuth C(1983)A modular approach to key safeguarding IEEE Trans Inf Theory 29 208-210
- [3] Bloom J(2009)A proactive secret sharing scheme in matrix projection method Int J Secur Netw 4 201-209
- [4] Bai L(1993)Efficient sharing of many secrets Proc STACS 1993 692-703
- [5] Zou X(2003)Sharing one secret vs. sharing many secrets Theor Comput Sci 295 123-140
- [6] Blundo C(2006)Fast 160-bits GF(p) elliptic curve crypto hardware of high-radix scalable multipliers Int Arab J Inf Technol (IAJIT) 3 342-349
- [7] De Santis A(2006)Secret Sharing Schemes with Applications in Security Protocols Sci Ann Cuza Univ 16 63-96
- [8] Vaccaro U(1989)Secret sharing scheme realizing general access structure Electron Commun Jpn 72 56-64
- [9] Di Crescenzo G(2006)Sharing multiple secrets: models, schemes and analysis Des Codes Crypt 39 89-111
- [10] Gutub A(1981)On sharing secrets and reed-Solomon codes Commun ACM 24 583-584