Author:
Cheng Xiaogang,Guo Ren,Zhou Changli
Funder
Basic theoretical research project in philosophy and social sciences under the guidance of Marxism, Colleges of Fujian province
Publisher
Springer Science and Business Media LLC
Reference36 articles.
1. Shamir: How to share a secret. Commun. ACM. 22(11), 612–613 (1979)
2. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
3. Hsu, C.F., Harn, L.: Multipartite Secret sharing based on CRT. Wirel. Pers. Commun. 78, 271–282 (2014). https://doi.org/10.1007/s11277-014-1751-x
4. Blakley, G.R.: Safeguarding cryptographic keys. In Proceedings of AFIPs I979 national computer conference, New York (Vol. 48, pp. 313–317) (1979)
5. Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science (FOCS), pp. 383–395 (1985)