1. Asmuth, C. and Bloom, J. “A Modular Approach to Key Safeguarding.” Texas A&M University, Department of Mathematics, College Station, TX (1980).
2. Lect Notes Comput Sci;J. Benaloh,1986
3. Benaloh, J. “Verifiable Secret-Ballot Elections.” Ph.D. Thesis presented at Yale University (Sep. 1987).
4. Blakley, G. “Safeguarding Cryptographic Keys.” Proc. AFIPS 1979 National Computer Conference, New York, NY (June 1979), 313–317.
5. Feldman, P. “A Practical Scheme for Non-interactive Verifiable Secret Sharing.” Proc. 28thIEEE Symp. on Foundations of Computer Science, Los Angeles, CA (Oct. 1987), 427–437.