1. George Robert Blakley . 1979 . Safeguarding cryptographic keys. In Managing Requirements Knowledge , International Workshop on. IEEE Computer Society, 313–31 George Robert Blakley. 1979. Safeguarding cryptographic keys. In Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 313–31
2. A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
3. A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration
4. Jun Kurihara , Shinsaku Kiyomoto , Kazuhide Fukushima , and Toshiaki Tanaka . 2008. A fast (3, n)-threshold secret sharing scheme using exclusive-or operations. IEICE transactions on fundamentals of electronics, communications and computer sciences 91, 1 ( 2008 ), 127–138. Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. 2008. A fast (3, n)-threshold secret sharing scheme using exclusive-or operations. IEICE transactions on fundamentals of electronics, communications and computer sciences 91, 1 (2008), 127–138.
5. On a Fast (k,n)-Threshold Secret Sharing Scheme