1. A. Beimel and B. Chor, Interaction in Key Distribution Schemes, in “Advances in Cryptology — CRYPTO 93”, D.R. Stinson Ed., “Lecture Notes in Computer Science”, Vol. 773, Springer-Verlag, Berlin, 1994, pp. 444–457.
2. R. Blom, An Optimal Class of Symmetric Key Generation Systems, in “Advances in Cryptology — Eurocrypt 84” “Lecture Notes in Computer Science”, Vol. 209, Springer-Verlag, Berlin, 1984, pp. 335–338.
3. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-Secure Key Distribution for Dynamic Conferences, in “Advances in Cryptology — CRYPTO 92”, E. Brickell Ed., “Lecture Notes in Computer Science”, Vol. 740, Springer-Verlag, Berlin, 1993, pp. 478–493.
4. I. Csiszár and J. Körner, Information Theory. Coding Theorems for Discrete Memoryless Systems, Academic Press, 1981.
5. A. Fiat and M. Naor, Broadcast Encryption, in “Advances in Cryptology — CRYPTO 93”, D.R. Stinson Ed., “Lecture Notes in Computer Science”, Vol. 773, Springer-Verlag, Berlin, 1994, pp. 480–491.