[1] 王锋, 谷利泽, 郑世慧, 等. 可验证的多策略秘密共享方案[J]. 北京邮电大学学报, 2010, 33(6):72-75. Wang Feng, Gu Lize, Zheng Shihui, et al. A verfiable multi-policy secret sharing scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33(6):72-75.
[2] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613.
[3] Blakley G R. Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference. New York, USA:AFIPS, 1979:313-317.
[4] Chang Tingyi, Hwang Minshiang, Yang Weipang. An improvement on the Lin-Wu(t, n) threshold verifiable multi-secret sharing scheme[J]. Applied Mathematics and Computation, 2005, 163(1):169-178.
[5] Eslami Z, Ahmadabadi J Z. A verifiable multi-secret sharing scheme based on cellular automata[J]. Information Sciences, 2010, 180(15):2889-2894.
[6] Olimid R F. Dealer-leakage resilient verifiable secret sharing[EB/OL]. IACR Cryptology ePrint Archive, 2014. http://eprint. iacr. org/2014/735.
[7] Jun S. Efficient verifiable multi-secret sharing scheme based on Hash function[J]. Information Sciences, 2014, 278(9):104-109. |