References
- G. R. Blakely, 'Safeguarding cryptographic key,' In proceeding of AFIPS National Computer Conference, pp.313-317, 1979
- AdiShamir, How to share a secret, Communication of the ACM, 21 : 120-126. 1979 https://doi.org/10.1145/359168.359176
- C. Cacjom, 'On-line secret sharing.' In C. boyd, editor, Proceeding of the 5th IMA conference on Cryptography and Coding, pp.190-198. Springer-Verlag, 1995
- Soo-Hyun Oh, Seung-Joo Kim, Dong-Ho Won, Efficient On-line Sharing Scheme based on One-way Hash Function. The transaction of the Korea Information Processing Society, Vol.7-C NO.10, pp.3128-3137, October, 2000
- O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority, in Proc. 19th ACM Symposium on Theorem Computing pp.218-229, 1987
- R. G. E. Pinch, On-line multiple secret sharing, Electronic Letters. 32(12) : 1087-1088, 1996 https://doi.org/10.1049/el:19960692
- H. Ghodosi, J. Pieprzyk, G.R. Chaudhrt, J. Seberry, How to pervent cheating in Pinch's scheme, Electronic Letters. 33(17) : 1453-1454, 1997 https://doi.org/10.1049/el:19970980
- Chan Yeob Yeun, Chris J. Mitchell, Mike Burmester, An Online Secret Sharing Scheme which Identifies All Cheater, Proc. of NORDSEC 98. The Third Noridic Workshop on Information Security Singapore, Dec., 1998
- Stefan Lucks, A Failure-Friendly Design Principle for Hash Functions, ASICRYPT 2005, LNCS 3788, pp.474C 494, 2005 https://doi.org/10.1007/11593447_26