[1] Blakley G R. Safeguarding cryptographic keys//Merwin RE, Zanca JT, Smith M, et al. Proceedings of American Federation of Information Processing Societes Conference, 1979 National Computer Conference. Montvale: AFIPS, 1979: 313-317. [2] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 24(11): 612-613. [3] He J,Dawson E. Multi stage secret sharing based on one way function[J]. Electronics Letters,1994,30(19): 1591-1592. [4] He J,Dawson E. Multi-secret sharing scheme based on one way function. Electronics Letters,1995,31(2): 93-95. [5] Ham L. Comment:multi stage secret sharing based on one-way function. Electronics Letters,1995,31(4): 262-263. [6] Ham L. Efficient sharing of multiple secrets[J]. IEEE Proceedings Computers and Digital Techniques,1995,142(3):237-240. [7] 庞辽军, 柳毅, 王育民. 一个有效的(t,n)门限多重秘密共享体制. 电子学报, 2006, 34(4): 587-589. Pang Liaojun, Liu Yi, Wang Yumin. An efficient (t,n) threshold multi-secret sharing scheme[J]. Acta Electronica Sinica, 2006, 34(4): 587-589. [8] Wang Mingsheng, Liu Zhuojun, Zhang Yanshuo. Secret sharing among weighted participants[J]. Journal of Beijing Electonic Science and Technology Institute, 2005, 13(2): 1-8. [9] 李滨. 基于特殊访问权限的差分秘密共享方案[J]. 四川大学学报(自然科学版), 2006, 43(1): 78-83. Li Bin. Difference secret Sharing scheme based on special access right[J]. Journal of Sichuan University (Natural Science),2006, 43(1): 78-83. [10] Fouque P A, Poupard G, Sten J. Sharing description in the context of voting or lotteries//Proceedings of Financial Cryptography 2000. Berlin: Springer-Verlag, 2000: 90-104. |