[1] B Blakley.Safeguading cryptographi c keys.In :Proceedings of the National Computer Conference.1979.313-317[2] A Shamir.How to share a secret.Communications of the ACM,1979,22(11):612-613[3] B Chor,S Goldwasser,S Mili ca,B Awerbuch.Verifiable secret sharing and acheiving simultanei ty in the presence of faults.In :Proceedings of the26th IEEE Syposium on Foundations of Computer Science.Washington :IEEE Computer Society Press,1985.383-395[4] T Pedersen.Non-Interact ive and information-theoretic secure verifiable secret sharing.In :Advances inCryptology Crypt' 91.Berlin :Springer-Verlag,1991.129-140[5] P Feldman.A practical scheme for non-int eractive verifiable secret sharing.In :Processing of the 28th IEEE Syposium on Foundatons of ComputerScience.Washington :IEEE Computer Society Press,1987.427-437[6] Markus Stadler.Publicly verifiable secret sharing.In :EUROCRYPT' 96 Proceeding:LNCS 1070.1996.190-199[7] J Cameni shch,J M Piveteau,M Stadler.An ef ficient fair payment system.In :Proc 3rd ACM Conf erence on Computer and Communi cations Security.1996[8] Theodore M Wong,Chjen-Xi Wang,Jeannet te M Wing.Verifiable secret redist ribution for threshold sharing schemes.In:ASIAOCRYPT' 02 Proceeding:LNCS.2002[9] R Gernnaro.Theory and practice of veriable secret sharing:[Ph.D Thesis].Masssarchusetts Institute of Technology(MIT),1996[10] Y Desmedt,S Jajodia.Redi stributing secret shares to new access st ructures and its applications.Technical Report ISSE TR-97-01,Fairfax :GeorgeMason University,1997[11] Y Frankel,P Gemmell,P D MacKenzie,M Yung.Proactive RSA.In :Processing of CRYPTO' 97 :LNCS 1294.1997.440-454[12] J Camenish.Group signature schemes and payment systems based on discrete logarithm problem :[Ph.D.Thesis].Konstanz :Hartung-Gorre Verlag,1998 |