1. A modular approach to key safeguarding;Asmuth;IEEE Transactions on Information Theory,1983
2. Secret sharing homomorphisms: Keeping shares of a secret secret;Benaloh,1987
3. Benaloh, J., “Verifiable Secret-Ballot Elections,” Ph.D. thesis, Yale University (1988)
4. Generalized secret sharing and monotone functions;Benaloh,1989
5. Blakley, G.R., Safeguarding cryptographic keys, in: National Computer Conference, 1979, American Federation of Information Processing Societies Proceedings 48, 1979, pp. 313–317