|
[1]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[2]
|
Blakley, G.R. (1979) Safeguarding Cryptographic Keys. 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, 4-7 June 1979, 313-318. [Google Scholar] [CrossRef]
|
|
[3]
|
Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B. (1985) Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. 26th Annual Symposium on Foundations of Computer Science (SFCS 1985), Portland, 21-23 October 1985, 383-395. [Google Scholar] [CrossRef]
|
|
[4]
|
Feldman, P. (1987) A Practical Scheme for Non-Interactive Verifiable Secret Sharing. 28th Annual Symposium on Foundations of Computer Science (SFCS 1987), Los Angeles, 12-14 October 1987, 427-438. [Google Scholar] [CrossRef]
|
|
[5]
|
Asmuth, C. and Bloom, J. (1983) A Modular Approach to Key Safeguarding. IEEE Transactions on Information Theory, 29, 208-210. [Google Scholar] [CrossRef]
|
|
[6]
|
Iftene, S. (2007) Secret Sharing Schemes with Applications in Security Protocols, Technical Report. University Alexandru Ioan Cuza of Iasi, Faculty of Computer Science.
|
|
[7]
|
Li, Q., Wang, Z.F. and Niu, X.M. (2005) A Non-Interactive Modular Verifiable Secret Sharing Scheme. 2005 Proceedings on Communications, Circuits and Systems, Hong Kong, 27-30 May 2005, 84-87.
|
|
[8]
|
Harn, L. and Lin, C. (2010) Strong (n, t, n) Verifiable Secret Sharing Scheme. Information Sciences, 180, 3059-3064. [Google Scholar] [CrossRef]
|
|
[9]
|
唐韶华. 特殊门限秘密共享方法及其应用[J]. 华南理工大学学报(自然科学版), 2007(10): 168-171+177.
|
|
[10]
|
Subba, R.Y.V. and Bhagvati, C. (2014) CRT Based Threshold Multi Secret Sharing Scheme. International Journal of Network Security, 16, 249-255.
|
|
[11]
|
Harn, L. and Miao, F.Y. (2013) Weighted Secret Sharing Based on the Chinese Remainder Theorem. International Journal of Network Security, 2013, 420-425.
|
|
[12]
|
Harn, L. and Fuyou, M. (2014) Multilevel Threshold Secret Sharing Based on the Chinese Remainder Theorem. Information Processing Letters, 114, 504-509. [Google Scholar] [CrossRef]
|
|
[13]
|
Dong, X.D. (2015) A Multi-Secret Sharing Scheme Based on the CRT and RSA. International Journal of Electronics and Information Engineering, 2, 47-51.
|
|
[14]
|
Ning, Y., Miao, F., Huang, W., Meng, K., Xiong, Y. and Wang, X. (2018) Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. In: Lecture Notes in Computer Science, Springer 310-331. [Google Scholar] [CrossRef]
|
|
[15]
|
Wu, L., Miao, F., Meng, K. and Wang, X. (2021) A Simple Construction of CRT-Based Ideal Secret Sharing Scheme and Its Security Extension Based on Common Factor. Frontiers of Computer Science, 16, 1-9. [Google Scholar] [CrossRef]
|
|
[16]
|
Vorisek, C.N., Lehne, M., Klopfenstein, S.A.I., Mayer, P.J., Bartschke, A., Haese, T., et al. (2022) Fast Healthcare Interoperability Resources (FHIR) for Interoperability in Health Research: Systematic Review. JMIR Medical Informatics, 10, e35724. [Google Scholar] [CrossRef] [PubMed]
|
|
[17]
|
Yang, C., Li, P., Cheng, H., Kuo, H., Lu, M. and Xiong, L. (2024) A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. IEEE Internet of Things Journal, 11, 10325-10335. [Google Scholar] [CrossRef]
|
|
[18]
|
Cohen, H. (2013) A Course in Computational Algebraic Number Theory. Springer Science & Business Media.
|