1. M. Ben-Or and T. Rabin, Verifiable secret sharing and multiparty protocols with honest majority,Proc. 21st ACM Symposium on Theory of Computing, (1989) pp. 73?85.
2. G. R. Blakley, Safeguarding cryptographic keys,Proceedings AFIPS 1979 National Computer Conference, (1979) pp. 313?317.
3. E. F. Brickell and D. R. Stinson, The detection of cheaters in threshold schemes,SIAM J. Disc. Math., Vol. 4 (1991) pp. 502?510.
4. Lectures Notes in Computer Science;R. M. Capocelli,1992
5. M. Carpentieri, A. De Santis, and U. Vaccaro, Size of shares and probability of cheating in threshold schemes,Advances in Cryptology?EUROCRYPT 93 (T. Helleseth, ed.), Lecture Notes in Computer Science, Springer-Verlag, New York, to appear.