Author:
Li Lele,Han Zhaowei,Li Zhihui,Guan Feiting,Zhang Li
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference44 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop On, pp. 313–313. IEEE Computer Society (1979)
3. Mignotte, M.: How to share a secret. In: Cryptography: Proceedings of the Workshop on Cryptography Burg Feuerstein, Germany, March 29–April 2, 1982 1, pp. 371–375 (1983). Springer
4. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208–210 (1983)
5. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献