1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, AFIPS 1979, pp. 313–317 (1979)
2. Brickell, E.F.: Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing 9, 105–113 (1989)
3. Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of FOCS 1987, pp. 427–437. IEEE Press, Los Alamitos (1987)
4. Lecture Notes in Computer Science;P.A. Fouque,2001
5. Lecture Notes in Computer Science;R. Gennaro,1996