SHAMIR A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613. doi: 10.1145/359168.359176
BLAKLEYG R. Safeguarding Cryptographic Keys[C]//1979 International Workshop on Managing Requirements Knowledge. New York: IEEE Press, 1979: 313-318.
STINSON D R. Cryptography Theory and Practice[J]. Clinical Nurse Specialist CNS, 1995, 7(3): 177-186.
ASMUTH C, BLOOM J. A Modular Approach to Key Safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29(2): 208-210. doi: 10.1109/TIT.1983.1056651
KARNINE, GREENE J, HELLMANM. On Secret Sharing Systems[J]. IEEE Transactions on In formation Theory, 1983, 29(1): 35-41. doi: 10.1109/TIT.1983.1056621
MCELIECE R J, SARWATE D V. On Sharing Secrets and Reed-Solomon Codes[J]. Communications of the ACM, 1981, 24(9): 583-584. doi: 10.1145/358746.358762
OZBEK I, SIAP I. A New Secret Sharing Scheme[J]. Electronic Notes in Discrete Mathematics, 2016, 56: 43-48. doi: 10.1016/j.endm.2016.11.007
CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//26th Annual Symposium on Foundations of Computer Science. New York: IEEE Press, 1985: 383-395.
FELDMAN P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing[C]//28th Annual Symposium on Foundations of Computer Science. New York: IEEE Press, 1987: 427-438.
STADLER M. Publicly Verifiable Secret Sharing[M]//Advancesin Cryptology-EUROCRYPT'96. Berlin: Springer, 1996: 190-199.
SCHOENMAKERS B. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting[J]. Lecture Notes in Computer Science, 1999, 1666: 784-784.
HARN L, LIN H Y. An L-Span Generalized Secret Sharing Scheme[M]//Advancesin Cryptology-CRYPTO'92. Berlin: Springer, 1992: 558-565.
HARN L. Comment: Multistage Secret Sharing Based on One-Way Function[J]. Electronics Letters, 1995, 31(4): 262. doi: 10.1049/el:19950201
HARN L. Efficient Sharing (Broadcasting) of Multiple Secrets[J]. IEE Proceedings-Computers and Digital Techniques, 1995, 142(3): 237. doi: 10.1049/ip-cdt:19951874
CHEN L Q, GOLLMANN D, MITCHELL C J, et al. Secret Sharing with Reusable Polynomials[M]//Information Security and Privacy. Berlin: Springer, 1997: 183-193.
许春香, 肖国镇. 门限多重秘密共享方案[J]. 电子学报, 2004, 32(10): 1687-1689.
ELGAMAL T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[C]//Advances in Cryptology. Berlin: Springer, 1985.