[1] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22 (11): 612-613. [2] Pieprzyk J, Zhang Xianmo. Constructions of cheating immune secret sharing, lecture notes in computer science//ICISC 2001. Berlin: Springer-Verlag, 2001: 226-243. [3] Pieprzyk J, Zhang Xianmo. On cheating immune secret sharing[J]. Discrete Mathematics and Theoretical Computer Science, 2004, 2(6): 253-264. [4] Zhang Jie, Chang Zuling, Wen Qiaoyan. Further results of cheating immune secret sharing[J]. The Journal of China Universities of Posts and Telecommunications, 2004, 11(4): 26-28. [5] 张, 刘振华, 温巧燕. 欺骗免疫秘密共享[J]. 北京邮电大学学报, 2005, 28(4): 83-86. Zhang Jie, Liu Zhenhua, Wen Qiaoyan. Cheating immune secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(4): 83-86. [6] Pieprzyk J, Zhang Xianmo. Cheating prevention in secret sharing over GF(pt)//INDOCRYPT 2001. Berlin: Springer-Verlag, 2001: 79-90. [7] 温巧燕, 钮心忻, 杨义先. 现代密码学中的布尔函数[M]. 北京: 科学出版社, 2000: 19-20. Wen Qiaoyan, Niu Xinxin, Yang Yixian. Boolean functions of modern cryptograph. Beijing: Science Press, 2000: 19-20. [8] Zhang Xianmo, Zheng Yuliang. Cryptographically resilient functions . IEEE Trans Inform Theory, 1997, 43: 1740-1747. [9] Stinson D R. Cryptography theory and practice [M]. Boca Raton: CRC Press LLC, 1995: 327-359. |