1. Shamir, Adi.: How to share a secret. Communications of the ACM 22.11, 612–613 (1979)
2. Blakley, George Robert.: Safeguarding cryptographic keys. Proceedings of the national computer conference. Vol. 48, pp. 313–317 (1979)
3. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE transactions on information theory, 30(2), 208–210 (1983)
4. He, Jingmin, and Edward Dawson.: Multistage secret sharing based on one-way function. Electronics Letters 30.19, 1591–1592 (1994)
5. Chien, Hung-Yu, J. A. N. Jinn-Ke, and Yuh-Min Tseng.: A practical (t, n) multi-secret sharing scheme. IEICE transactions on fundamentals of electronics, communications and computer sciences 83.12, 2762–2765 (2000)