1. Blakley G R. Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, Monval, 1979. 313–317
2. Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613
3. Wang Y J, Wong D S, Wu Q H, et al. Practical distributed signatures in the standard model. In: Proceedings of the Cryptographer’s Track at the RSA Conference, San Francisco, 2014. 307–326
4. Deng H, Wu Q H, Qin B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inform Sci, 2014, 275: 370–384
5. Deng H, Wu Q H, Qin B, et al. Who is touching my cloud. In: Proceedings of the 19th European Symposium on Research in Computer Security, Part I, Wroclaw, 2014. 362–379