1. Amos Beimel . 2011. Secret-Sharing Schemes: A Survey . In Coding and Cryptology . Springer Berlin Heidelberg . Amos Beimel. 2011. Secret-Sharing Schemes: A Survey. In Coding and Cryptology. Springer Berlin Heidelberg.
2. 018)]% chun2018privacy, Hu Chun , Kui Ren , and Wei Jiang . 2018. Privacy-power usage and supply control in smart grids. Computers and security , Vol. 77 , 1 ( 2018 ), 709--719. 018)]% chun2018privacy, Hu Chun, Kui Ren, and Wei Jiang. 2018. Privacy-power usage and supply control in smart grids. Computers and security , Vol. 77, 1 (2018), 709--719.
3. Ronald Cramer , Ivan Bjerre Damgård, and Jesper Buus Nielsen . 2015 . Secure multiparty computation. Cambridge University Press . Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen. 2015. Secure multiparty computation. Cambridge University Press.
4. The breadth of Shamir's secret-sharing scheme
5. Oded Goldreich . 2004. The Foundations of Cryptography . Vol. 2 . Cambridge Univ. Press , Chapter General Cryptographic Protocols. http://www.wisdom.weizmann.ac.il/ oded/PSBookFrag/prot.ps Oded Goldreich. 2004. The Foundations of Cryptography. Vol. 2. Cambridge Univ. Press, Chapter General Cryptographic Protocols. http://www.wisdom.weizmann.ac.il/ oded/PSBookFrag/prot.ps