1. How to share a secret;Shamir A;Communications Of The Acm,1979
2. Blakley, G. R. (1979). Safeguarding cryptographic keys, in: Proceedings of the National Computer Conference, American Federation of Information Processing Societies, pp. 313–317.
3. Blundo, C., Cresti, A., Santis, A., & Vaccaro, U. (1994). Fully dynamic secret sharing schemes. In: Advances in cryptology CRYPTO’92: proceedings of the 13th annual international cryptology conference, London, pp 110–125
4. Dynamic threshold secret reconstruction and its application to the threshold cryptography;Harn L;Inf Process Lett,2015
5. Lattice-based threshold-changeability for standard crt secretsharing schemes;Steinfeld R;Finite Fields And Their Applications,2006