Author:
Wang Xiuli,Jin Ni,Deng Yangmei
Reference16 articles.
1. How to Share a Secret[J];A Shamir;Communications of the ACM,1979
2. Safeguard cryptographic keys[C];G Blakly;Proceeding of the AFIPS 1979 National Computer Conference,1979
3. A combinatorial approach to threshold schemes;D R Stinson;SIAM on Discrete Math,1988
4. New combinatorial designs and their applications to authentication codes and secret sharing schemes;Ogata Wakaha;Discrete Mathematics,2004
5. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs[J];Yingpu Deng;Acta Mathematicae Applicatae Sinica, English Series,2007