参考文献 [1]Blakley G R.Safeguarding Cryptographic Keys[C]//Proceedings of International Workshop on Managing Requirements Knowledge.Washington D.C.,USA:IEEE Press,1979:313-317. [2]Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613. [3]Chor B,Goldwasser S,Micali S,et a1.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//Proceedings of the 54th Annual Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1985:251-260. [4]Stadler M.Publicly Verifiable Secret Sharing[C]//Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Tech-niques.New York,USA:ACM Press,1996:190-199. [5]Ingemarsson I,Simmons G J.A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party[C]//Proceedings of Workshop on the Theory and Application of Cryptographic Tech-niques Aarhus.Berlin,Germany:Springer,1991:266-282. [6]Dawson E.Multisecret-sharing Scheme Based on One-way Function[J].Electronics Letters,1995,31(2):93-95. [7]李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,387(9):2059-2065. [8]尚雪娇,杜伟章.基于双线性对的可公开验证多秘密共享方案[J].计算机工程,2014,40(9):155-166. [9]刘佳,韩文报.一种安全的公开可验证门限多秘密共享方案[J].计算机工程,2009,35(1):24-26. [10]汪彩梅,李正茂.椭圆曲线上可选子密钥的秘密共享方案[J].计算机工程与科学,2009,31(9):23-82. [11]王玲玲,侯整风.无可信中心的可认证秘密共享协议[J].计算机应用,2007,27(S2):118-120. [12]侯建春,张建中.一个改进的可验证的多秘密共享方案[J].计算机工程与应用,2012,48(14):94-97. [13]吴星星,李志慧,李婧.一个可验证的多秘密共享门限方案[J].计算机工程与应用,2013,49(13):65-67. [14]何二庆,侯整风,朱玲玲.一种无可信中心动态秘密共享方案[J].计算机应用研究,2013,30(2):491-493. [15]于佳,陈养奎,郝蓉,等.无可信中心的可公开验证多秘密共享[J].计算机学报,2014,37(5):1030-1038. 编辑顾逸斐 |