1. Shamir A. How to Share a Secret [J].Communications of the ACM, 1979,22(11): 612–613.
2. Blakley G R. Safeguarding Cryptographic Keys [J].Proceedings of AFIPS 1979 National Computer Conference, 1979,48: 313–317.
3. Desmedt Y. Threshold Cryptography [J].European Transactions on Telecommunications. 1994,5(4): 449–457.
4. Cocks C. Split Knowledge of RSA Parameters [C]//Cryptography and Coding. Berlin: Springer-Verlag, 1997: 89–95.
5. Boneh D, Franklin M. Efficient Generation of Shared RSA Keys [C]//Proc of Crypto '97. Berlin: Springer-Verlag, 1997: 425–439.