暂无分享,去创建一个
[1] Markus Stadler,et al. Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.
[2] Hong Fan,et al. A New Multi-secret Sharing Scheme with Multi-policy , 2007, The 9th International Conference on Advanced Communication Technology.
[3] Yu-Min Wang,et al. A Secure and Efficient Secret Sharing Scheme with General Access Structures , 2006, FSKD.
[4] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[6] Massoud Hadian Dehkordi,et al. An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.
[7] T.-C. Wu,et al. (t,n) threshold verifiable multisecret sharing scheme based on factorisation intractability and discrete logarithm modulo a composite problems , 1999 .
[8] Pang Liaojun,et al. An efficient and secure multi-secret sharing scheme with general access structures , 2006, Wuhan University Journal of Natural Sciences.
[9] Y. Yeh,et al. Dynamic Multi-Secret Sharing Scheme , 2008 .
[10] Yun Wei,et al. A Multi-Stage Secret Sharing Scheme with General Access Structures , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Ed Dawson,et al. Multistage secret sharing based on one-way function , 1994 .
[13] Wei-Pang Yang,et al. An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme , 2005, Appl. Math. Comput..
[14] Justie Su-tzu Juan,et al. An Efficient and Secure Multi-secret Image Sharing Scheme with General Access Structure , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.