共 12 条
[1]
BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
[2]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[4]
CHAUM D, 1988, COMMUNICATION
[5]
Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64
[6]
FELDMAN P, 1986, 28TH P IEEE S F COMP, P427
[7]
Goldreich O., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P174, DOI 10.1109/SFCS.1986.47
[8]
ON SHARING SECRETS AND REED-SOLOMON CODES
[J].
COMMUNICATIONS OF THE ACM,
1981, 24 (09)
:583-584
[9]
RABIN T, 1989, 21 STOC, P73