[1] Shamir A. How to Share a Secret[J]. Communications of Commu- nications of the ACM, 1979, 22(11): 612-613.
[2] Blakley G. Safeguarding Cryptographic Keys[C]//Proceedings of National Computer Conference. New York, USA: [s. n.], 1979: 313-317.
[3] Stinson D R. An Explication of Secret Sharing Schemes[J]. Designs, Codes and Cryptography, 1992, 2(4): 357-390.
[4] Ding Cunsheng. The Weight Distribution of Some Irreducible Cyclic Codes[J]. IEEE Transactions on Information Theroy, 2009, 55(3): 955-960.
[5] 郭玉娟, 李志慧, 赖 红. 基于线性码上的动态可验证的秘密共享方案[J]. 陕西师范大学学报, 2010, 38(4): 7-12.
[6] 刘木兰, 肖亮亮, 张志芳. 一类基于图上随机游动的密钥共享体制[J]. 中国科学E辑, 2007, 37(2): 199-208.
[7] Jackson W, Martin K M. Perfect Secret Sharing Schemes on Five Participants[J]. Designs, Codes and Cryptography, 1996, 9(3): 267-286.
[8] Van Dijk M. On the Informationg Rate of Perfect Secret Sharing Schemes[J]. Designs Codes Cryptography, 1995, 6(2): 143-169.
[9] Capocelli R M, De Santis A, Gargano L, et al. On the Size of Shares for Secret Sharing Schemes[J]. Cryptology, 1993, 6(3): 157-167.
[10] Stinson D R. 密码学原理与实践[M]. 冯登国, 译. 3版. 北京: 电子工业出版社, 2009.
[11] Chartrand G, Erwin D, Johns G L, et al. Boundary Vertices in Graphs[J]. Discrete Mathematics, 2003, 263(2): 25-34.
[12] Blundo C, De Santis A, Stinson D R, et al. Graph Decompositions and Secret Sharing Schemes[J]. Cryptology, 1995, 8(1): 39-64. |