SHAMIR A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613. doi: 10.1145/359168.359176
BLAKLEY G R. Safeguarding Cryptographic Keys[C] //1979 International Workshop on Managing Requirements Knowledge (MARK). New York: IEEE, 2019: 313-318.
涂彬彬, 陈宇. 门限密码系统综述[J]. 密码学报, 2020, 7(1): 1-14.
赵宗渠, 郭小杰, 殷明辉, 等. 物联网环境下基于身份匿签密的认证方法研究[J]. 重庆邮电大学学报(自然科学版), 2023, 35(2): 343-351.
赵武超, 许文超. 插值多项式的存在性和唯一性[J]. 洛阳师范学院学报, 2008, 27(2): 17-18.
BRICKELL E F. Some Ideal Secret Sharing Schemes[C] //Advances in Cryptology-EUROCRYPT '89. Berlin, Heidelberg: Springer, 1990: 468-475.
ERSOY O, PEDERSEN T B, ANARIM E. Homomorphic Extensions of CRT-Based Secret Sharing[J]. Discrete Applied Mathematics, 2020, 285: 317-329. doi: 10.1016/j.dam.2020.06.006
KARNIN E, GREENE J, HELLMAN M. On Secret Sharing Systems[J]. IEEE Transactions on Information Theory, 1983, 29(1): 35-41. doi: 10.1109/TIT.1983.1056621
BRICKELL E F, DAVENPORT D M. On the Classification of Ideal Secret Sharing Schemes[J]. Journal of Cryptology, 1991, 4(2): 123-134. doi: 10.1007/BF00196772
CHIEN H Y, JAN J K, TSENG Y M. A Practical (t, n) Multi-Secret Sharing Scheme[J]. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2000, 83(12): 2762-2765.
MARTÍN DEL REY A, MATEUS J P, SÁNCHEZ G R. A Secret Sharing Scheme Based on Cellular Automata[J]. Applied Mathematics and Computation, 2005, 170(2): 1356-1364. doi: 10.1016/j.amc.2005.01.026
蔡兆政, 瞿云云, 包小敏. 一个可公开验证的多重秘密共享门限方案[J]. 西南大学学报(自然科学版), 2021, 43(7): 105-110. doi: 10.13718/j.cnki.xdzk.2021.07.014
张剑, 林昌露, 黄可可, 等. 基于多项式插值的多等级秘密共享方案[J]. 密码学报, 2022, 9(4): 743-754.
HSU C F, CHENG Q, TANG X M, et al. An Ideal Multi-Secret Sharing Scheme Based on MSP[J]. Information Sciences, 2011, 181(7): 1403-1409. doi: 10.1016/j.ins.2010.11.032
CAPUTO S, KORCHMÁROS G, SONNINO A. Multilevel Secret Sharing Schemes Arising from the Normal Rational Curve[J]. Discrete Applied Mathematics, 2020, 284: 158-165. doi: 10.1016/j.dam.2020.03.030
BENDLIN R, DAMGÅRD I. Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems[C] //Theory of Cryptography. Berlin, Heidelberg: Springer, 2010: 201-218.
YU K P, TAN L, YANG C X, et al. A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings[J]. IEEE Internet of Things Journal, 2022, 9(11): 8154-8167. doi: 10.1109/JIOT.2021.3125190
TESSARO S, ZHU C Z. Thresholdand Multi-Signature Schemes from Linear Hash Functions[M] //Advances in Cryptology-EUROCRYPT 2023. Cham: Springer Nature, 2023: 628-658.
BRAUN L, CASTAGNOS G, DAMGÅRD I, et al. An Improved Threshold Homomorphic Cryptosystem Based on Class Groups[M] //Security and Cryptography for Networks. Cham: Springer Nature, 2024: 24-46.
LI F L, LIU Z, LIU L, et al. A Rational Hierarchical (T, n)-Threshold Quantum Secret Sharing Scheme[J]. Quantum Information Processing, 2024, 23(2): 60. doi: 10.1007/s11128-024-04269-1
邓鸿, 林金朝, 庞宇, 等. 基于FPGA的BAN认证算法硬件实现[J]. 重庆邮电大学学报(自然科学版), 2019, 31(6): 799-804.
LI X Y, MOU H J, LU D J. An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption[J]. Wuhan University Journal of Natural Sciences, 2019, 24(3): 218-222. doi: 10.1007/s11859-019-1388-4
刘莺迎. 大整数分解算法的设计与实现[J]. 科学技术创新, 2020(36): 109-110.
杜俊. RSA算法中大素数快速生成和运算方法实现[J]. 中阿科技论坛(中英文), 2024(9): 108-112.