1. Dongping Huang, Liu duo, Daoshun Wang and Yigi Dai. A secure threshold secret sharing scheme. electronic journal, 2006, 34(11):1937–1940.
2. B. Schoenmakers. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting. In: M. Wiener ed., Advance in Cryptology- Crypto’99 Proceedings, LNCS 1666. Berlin: Springer-Verlag, 1999. 148–164.
3. Chai Z.C, Cao Z.F, Lu R.X. Id-based threshold decryption without random oracles and its application in key escrow. In: proceeding of the Inforsec 2004, shanghai, 2004, 119–124.
4. T.P. Pedersen, No-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: J. Feigenbaum ed., Advances in Cryptology-Crypto’91 Proceedings, LNCS 576. Berlin: Springer-Verlag, 1992. 129–140.