共 13 条
[4]
Verifiable threshold signature schemes against conspiracy attack[J] . Gan Yuan-ju.  Journal of Zhejiang University Science . 2004 (1)
[5]
How to share a secret with cheaters[J] . Martin Tompa,Heather Woll.  Journal of Cryptology . 1989 (3)
[6]
An improvem ent onthe L in-wu(t,n)threshold verifiab le mu lti-secret sharingschem e. Chang T Y,Hwang M S,Yang W P. App lied M athem atics and Computation . 2005
[7]
E ffic ient sharing(broadcasting)of mu ltip le secret. Harn L. IEE Proc Comput D igit Tech . 1995
[9]
Comm ent on L in-wu(t,n)threshold ver-ifiab le mu ltisecret sharing schem e. He W H,W u T S. IEE Proc ComputD igit Tech . 2001
[10]
E ffic ient cheater identificationm ethod for threshold schem es. Chang C C,Hwang R J. IEE Proc Comput D igitTech . 1997