1 |
A. Shamir, "How to share a secret," Communication of the ACM, vol. 22, no.11, pp. 612-613, Nov. 1979.
DOI
ScienceOn
|
2 |
G. Blakley, "Safeguarding crypto- graphic keys," AFIPS Conference Proceedings, 48, pp. 313-317, 1979.
|
3 |
B. Chor and S. Goldwasser, "Verifiable Secret Sharing and achieving simultaneity in the presence of faults," Proc. of 26th IEEE Symposium. FOCS, pp. 383-395, Oct. 1985.
|
4 |
J. He and E. Dawson, "Multistage secret sharing based on one-way function," Electronics Letters, vol.31, no. 19, pp. 1591-1592, Sep. 1994.
|
5 |
R. Shi, H. Zhong and L. Huang, "A (t,n)-Threshold Verified Multi-secret Sharing Scheme based on ECDLP," 8th ACIS International Conference, vol. 2, pp. 9-13, July 2007.
|
6 |
W. Chen, L. Xiang, B. Yuebin and G. Xiaopeng, "A New Dynamic threshold Secret sharing Scheme from bilinear Maps," International Conference on Parallel Processing Workshops, pp. 19-22, Sep. 2007.
|
7 |
S. J. Wang, Y. R. Tsai, and J. J. Shen, "Verifiable threshold scheme in multi-secret sharing distributions upon extensions of ecc," Wireless Personal Communications, Springer, vol. 56, no.1, pp. 173-182, Jan. 2011.
DOI
|
8 |
Z. Eslami and K. Rad, "A New Verifiable Multi-secret sharing Scheme Based on Bilinear Maps," Wireless Personal Communications, Springer, vol. 63, no. 2, pp. 459-467, March 2012.
DOI
|
9 |
M. H. Tadayon, H. Khanmohammadi, and S. Arabi, "An attack on a dynamic multi-secret sharing scheme and enhancing its security," Electrical Engineering (ICEE), 21st Iranian Conference, pp. 1-5, May 2013.
|
10 |
X. Dong and Y. Zhang, "A Multi-secret sharing scheme based on general linear groups," 3rd International Conference on Information Science and Technology, pp. 480-483, March 2013.
|
11 |
D. R. Stinson, Cryptography Theory And Practice, CRC press, 2006.
|