1. How to share a secret
2. [2] G.R. Blakley, “Safeguarding cryptographic keys, ” Proc. AFIPS, vol.48, pp.313-317, 1979.
3. [3] G.R. Blakley and C. Meadows, “Security of ramp schemes, ” Proc. CRYPTO'84, LNCS 196, pp.242-269, Springer-Verlag, 1985.
4. [4] H. Yamamoto, “On secret sharing systems using (k, L, n) threshold scheme, ” IEICE Trans. Fundamentals (Japanese Edition), vol.J68-A, no.9, pp.945-952, Sept. 1985.
5. [5] K. Kurosawa, K. Okada, K. Sakano, W. Ogata, and T. Tsujii, “Non perfect secret sharing schemes and matroids, ” Proc. EUROCRYPT'93, LNCS 765, pp.126-141, Springer-Verlag, 1993.