1. Lecture Notes in Computer Science, Vol. 740;A. Beimel,1993
2. Lecture Notes in Computer Science, Vol. 403;J. Benaloh,1990
3. C. Berge. Graphs, 2nd rev. edn. North-Holland, Amsterdam, 1985.
4. G. R. Blakley. Safeguarding cryptographic keys. AFIPS Conf. Proc. 48 (1979), 313–317.
5. Lecture Notes in Computer Science, Vol. 740;B. Blakley,1993