1. C. Ellison, Emergency key recovery without third parties, Talk given at the CRYPYO ’96 rump session, August 96.
2. C. Kaufman, R. Perlman, M. Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, Englewood Cliffs, NJ, 1995, p. 205.
3. H. Lin, L. Harn, A generalized secret sharing scheme with cheater detection, Proc. ASIACRYPT ’91, Lecture Notes in Computer Science, vol. 739, Springer, Berlin, pp. 149–158.
4. How to share a secret;Shamir;Commun. ACM,1979