1. Safeguarding cryptographic keys;Blakley,1979
2. The detection of cheaters in threshold schemes;Brickell,1990
3. Secret sharing and achieving simultaneously in the presence of faults;Chor,1985
4. Properties and constraints of cheating-immune secret sharing schemes;D'Arcoa;Discrete Appl Math,2006
5. A practical scheme for non-interactive verifiable secret sharing;Feldman,1978