1. Generalized secret sharing and monotone functions;Benaloh,1990
2. Safeguarding cryptographic keys;Blakley,1979
3. On the information rate of secret sharing schemes;Blundo,1993
4. Graph decompositions and secret sharing schemes;Blundo;J. Cryptology,1995
5. On the classification of ideal secret sharing schemes;Brickell;J. Cryptology,1991