1 G R Blakey.Safeguarding Cryptographi c K eys.A FIPS Conference Proceedings, 1979, 48 :313~ 3172 E F Brickell.Some Ideal Secret Sharing Scheme.Journal of Combinatorial Mat hemat ics and Combinatorial Computing, 1989, 9:105 ~ 1133 E F Brickell, D M Davenport.O n the Classif icat ion of Ideal Secret Sharing S chemes.Journal of C rypt ology, 1991, 4 :121 ~ 1344 L Gong, D L W heeler.A M at rix Key-distribution Scheme.Journal of Cryptology, 1990, 2 :51 ~ 595 C S Laih, L Harn, J Lee, T Hwang.D ynamic Threshold Scheme Based on the Definition of Cross-product in an N-dim ensional Linear Space.Crypto 89, Lecture Notes in Computer Science.Berlin :Springer-verlag, 1990.435 :286 ~ 2976 S C Kot hari.Generalized Linear Threshold S cheme.Advances in Cryptography :Proceedings of CRY PTO 84.Berlin ;Springer-V erlag, 1985.231 ~ 2417 E D K arnin, J W Greene, M E Hellman.O n Sharing Secret System.IEE E Transactions on Information Theory, 1983, 29 :35 ~ 418 T M atsumoto.Incidence Structure for Key Sharing.Advance in Cryptology :A SIAC RYPT 94.Lecture Not es in Computer Science, 1995,917 :342 ~ 3539 A S hamir.How to Share a Secret.Communi cations of the ACM, 1979, 22(11):612 ~ 61310 D R S tinson.C rypt ography Theory and Practice.CRC Press, Inc, Boca Raton, 199511 D R Stinson.O n Some Methods for Uncondi tionally Secure Key Dist ribution and Broadcast Encrypt ion.Designs, Codes and Cryptography,1997, 12 :215 ~ 24312 D R S tinson.An Explication of Secret Sharing Scheme.Desingns, Codes and Cryptography, 1992, 4 :177 ~ 19113 G J Simmons(ed).Contempoary C ryptology.The Science of Information Int egrity.IEEE Press, 199214 B S chneier.Applied C ryptography :Protocol, Algori thm, and Source Code in C.John Wiley & Sons, Inc.199615 M Wang, D Feng, G W ang.Threshold S chemes Based on Plǜcker Coordinates.Submit ted |