References
- G. R Blakely, 'Safeguarding cryptographic key,' In proceeding of AFIPS National Computer Conference, pp.313-317, 1979
- C. Cachin, 'On-line secret sharing,' In C. Boyd, editor. Proceeding of the 5th IMA conference on Cryptography and Coding, pp.190-198, Springer-Verlag, 1995
- L. Chen. D Gollmann. C J Mitehell and P wild, 'Secret sharing with Reusable Polynomial,' ACISP'97, pp.183-193 1997
- W. Diffie and M Hellman, 'New Directions in Cryptography,' IEEE Trransaction on Information Theory IT-22, pp.644-654, 1976
- P. Fedlman, 'A Practical scheme for Non-interactive Verifiable secret sharing,' Proceeding of the 28th Annual Symposium on the Foundation of Computer Science, pp.427-437, 1987
- O. Goldreich, S. Micali, and A. Wigderson, 'How to play any mental game or a completeness theorem for protocols with honest majority,' in Proc 19th ACM Symposium on Theory of Computing (STOC), pp 218-229, 1987 https://doi.org/10.1145/28395.28420
- H. Ghodosi, J. Pieprzyk, G. R. Chaudhry, J. Seberry, 'How to prevent cheating in Pinch's scheme,' Electronic Letters, 33(17) : 1453-1454, 1997
- H. Y Lin and L. Harn, 'A Generalized Secret Sharing Scheme with Cheater Detection,' Advances in Cryptology- ASIACRYPT'91 Proceeding, Springer-Verlag, pp.149-158, 1993
- A. Menezes, P. van Oorschot, S Vanstone, 'Handbook of Applied Cryptography,' CRC Press, 1996
- T. P. Pederson, 'Distrobuted provers with Applications to Undeniable signatures,' Advances in Cryptology-EUROCRYPT'91 Proceeding, Springer-Verlag, pp.221-242, 1991
- R. G. E. Pinch, 'On-line multiple secret sharing,' Electronic Letters, 32( 12) : 1087-1088, 1996 https://doi.org/10.1049/el:19960692
- R. Rivest, A. Shamir, and L. Adleman, 'A method for Obtaining Digital signature and Public key Cryptosystems,' Communication of the ACM, pp. 120-128, FEB. 1978 https://doi.org/10.1145/359340.359342
- Adi Shamir, 'How to share a secret,' Communication of the ACM, 21 : 120-126, 1979 https://doi.org/10.1145/359168.359176
- M. Tompa, H. Woll, 'How to share a secret with cheater,' Journal of Cryptology, 1 : 133-138, 1988
- Chan Yeob Yeun, Chris J. Mitchell, 'How to identify all cheater in Pinch's scheme,' JWIS '98, Japan-Singapore Joint Workshop on Information Security, Singapore, Dec. 1998
- Chan Yeob Yeun, Chris J. Mitchell, Mike Burmester, 'An Online Secret Sharing which Identifies All Cheater,' Proceeding of NORDSEC '98, The Third Nordic Workshop on Secure IT Systems. Norway, Nov. 1998
- Y. Zheng, T Hardjono and J. Seberry, 'Reusing share in secret sharing schemes,' The Computer Journal 37, pp.199-205, 1994 https://doi.org/10.1093/comjnl/37.3.199
- FIPS PUB-185 Escrowed Encryption Standard, 1993
- http://www.zoi.net/internet/index.htm