References
- G. R. Blakley, 'Safeguarding Cryptographic keys,' in Proc. Amer. Fed. Inform. Proc. Soc. NCC, vol.48, pp.313-317, June, 1977
- A, shmir, 'How to Share a Secret,' communication ACM, Vol.22, No.11, pp.612-613, Nov., 1979 https://doi.org/10.1145/359168.359176
- C. S. Laih, M. D. Lin and T. Hwang, 'A new threshold scheme with detecting and exposing forged shadows,' ISITA '90, pp.1053-1056, November, 1990
- C. S. Laih, L. Harn, J. Y. Lee and T. Hwang, 'Dynamic Threshold Scheme Based on the Definition of Cross-product in an N-Dimensional Linear Space,' Proc. Crypto '87, Springer-Verlag, pp.286-279
-
L. Harn and Hung-Yu Lin, 'A
${\ell$} -Span Generalized Secret Sharing Scheme,' Proc. Crypto '92, Springer-Verlag, pp.558-565 - Lee W., Johnson R., Dean Riess Jimmy T., Arnold, 'Introduction to Linear Algebra,' Addison-Wesley. Inc. 1993
- S. C. Kothari, 'Generalized Linear Threshold Scheme,' in Proc Cryto '86, Springer-Verlag, pp.231-241
- Mathematica lCryptology for Computer Scientists and Mathematicians, WAYNE PATTERSON, ROWMAN & LITTLEFIELD Pubilshers
- W. Diffie and M. E. Hellman, 'New Directions In Cryptography,' IEEE Transaction on Information Theory, Vol.IT-22, pp.644-65, 1976 https://doi.org/10.1109/TIT.1976.1055638
- C. Asmuth and J. Bloom, 'A Modular Approach To Key Safeguarding,' IEEE Transaction on Information Theory, Vol.IT-29, No.2, pp.208-210, March, 1983 https://doi.org/10.1109/TIT.1983.1056651
- M. Tompa and H. Woll, 'How To Share A Secret With Cheaters,' Crypto '86 pp.261-265
- Benaloh, j. and J. Leichter, generalized Secret Sharing and Monotone Functions, Advances in Cryptography - Crypto '86, A. M. Odlyzko (ed.), Springer-Verlag, Lecture Notes in Computer Science, Vol.236, pp.213-222, 1987
- Ernest F. Brickell, Some Ideal Secret Sharing Schemes, Proc. Crypto '88, Springer-Verlag, pp.468-475
- Ernest F. Brickell and Daniel M. Davenport, On the Classification of Ideal Secret Sharing Schemes, Proc. Crypto '88, Springer-Verlag, pp.279-285