[1] Shamir A. How to share a secret[J]. Communication of the ACM, 1979, 22(11): 612-613. [2] Blakley G. Safeguarding cryptographic keys//Proc AFIPS 1979 NCC. New York: AFIPS Press, 1979: 313-317. [3] 张劼, 刘振华, 温巧燕. 严格k-欺骗免疫秘密共享[J]. 北京邮电大学学报, 2007, 30(2): 24-27. Zhang Jie, Liu Zhenhua, Wen Qiaoyan. Strictly k-cheating immune secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(2): 24-27. [4] Dong Y, Go H W, Sui A F, et al. Providing distributed certificate authority service in mobile ad hoc networks//SecureComm 2005. Athens: , 2005: 149-156. [5] 于佳, 郝容, 孔凡玉, 等. 先动的可公开验证服务器辅助秘密共享[J]. 北京邮电大学学报, 2008, 31(5): 13-17. Yu Ja, Hao Rong, Kong Fanyu, et al. Proactive and publicly verifiable server-assisted secret sharing[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 13-17. [6] Chang T Y, Hwang M S, Yang W P. A new multi-stage secret sharing scheme using one-way function[J]. Association for Computing Machinery, 2005, 39(1): 48-55. [7] Chang T Y, Hwang M S, Yang W P. An improvement on the Lin-Wu (t,n)-threshold verifiable multi-secret sharing scheme[J]. Applied Mathematics and Computation, 2005, 163(1): 169-178. [8] Fouque P A, Poupard G, Stern J. Sharing decryption in the context of voting or lotteries//FC 2000. Berlin: Springer Verlag, 2000: 90-94. [9] Ray I, Narasimhamurthi N. An anonymous electronic voting protocol for voting over the Internet//WECWIS01. Los Alamitos: IEEE Computer Society, 2001: 188-190. [10] Geng Yongjun, Fan Xiahong, Hong Fan. A new multi-secret sharing scheme with multi-policy//ICACT07. Phoenix Park: National Computerization Agency, 2007: 1515-1517. [11] Lin Hanyu, Yeh Y S. Dynamic multi-secret sharing scheme[J]. International Journal of Contemporary Mathematical Sciences, 2008, 3(1): 37-42. |