|
[1]
|
Blakley, G.R. (1979) Safeguarding Cryptographic Keys. Proceedings of AFIPS National Computer Conference, Wash-ington DC, 4-7 June 1979, 313-317. [Google Scholar] [CrossRef]
|
|
[2]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[3]
|
Tompa, M. and Woll, H. (1988) How to Share a Secret with Cheaters. Journal of Cryptology, 1, 133-138. [Google Scholar] [CrossRef]
|
|
[4]
|
McEliece, R.J. and Sarwate, D.V. (1981) On Sharing Secrets and Reed-Solomon Codes. Communications of the ACM, 24, 583-584. [Google Scholar] [CrossRef]
|
|
[5]
|
蒋华, 张乐乾, 阮玲玲. 基于公钥密码体质的802.1x双向认证研究[J]. 计算机应用于软件, 2016, 33(2): 290-293.
|
|
[6]
|
张柄虹, 张串绒, 焦和平, 张欣威, 高胜国. 一种基于双线性对的公平可验证多秘密共享方案[J]. 空军工程大学学报(自然科学版), 2014, 15(4): 83-87.
|
|
[7]
|
谷婷. 无可信中心可验证可更新的向量空间秘密共享[J]. 科技与创新, 2018, 99(3): 35-39.
|
|
[8]
|
Chor, B., Goldwasser, S., Micali, S. and Awerbuch, B. (1985) Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. Proceeding 26th Annual Symposium on the Foun-dations of Computer Science, Portland, 21-23 October 1985, 383-395. [Google Scholar] [CrossRef]
|
|
[9]
|
Gennaro, R. and Rabin, M.O. (1998) Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography. Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, Puerto Vallarta, 28 June-2 July 1998, 101-111. [Google Scholar] [CrossRef]
|
|
[10]
|
Qiu, G., Wang, H., Wei S.M. and Xiao, G.Z. (2006) Infor-mation-Theoretic Secure Verifiable Secret Sharing over RSA Modulus. Wuhan University Journal of Natural Sciences, 11, 1849-1852. [Google Scholar] [CrossRef]
|
|
[11]
|
Andrychowicz, M., Dziembowski, S., Malinowski, D., et al. (2014) Secure Multiparty Computations on Bitcoin. Proc of IEEE Symposium on Security and Privacy, San Jose, 18-21 May 2014, 76-84. [Google Scholar] [CrossRef]
|