1 G R Blakley. S af eguarding Crypt ographic K eys. AFIPS Conf erence Proceedings, 1979, 48: 313~ 3172 E F Brickell. Some Ideal Secret Sharing Scheme. Journl of Combinat orial M athemat ics and Combinatorial Comput ing, 1989, 9: 105~ 1133 E F Brickell, D M Davenport. O n the Classif icat ion of Ideal Secret Sharing Schemes. Journal of Crypt ology, 1991, 4: 121~ 134.4 L Gong, D L W heeler. A M at rix K ey- dist ribut ion Scheme. Journal of Cryptology, 1990, 2: 51~ 595 C S Laih, L Harn, J Lee, T H wang. D ynamic T hreshold Scheme Based in t he Def inition of Cross- product in an N- dimensional Linear Space.Crypto c 89, Lect ure Not es in Comput er Science 435. 1990. 286~ 2976 S C Kot hari. Gemeralized Linear Threshold Scheme. A dvances in Crypt ography: Proceedings of Crypt oc 84. 1985. 231~ 241.7 E D K arnin, J W Greene, M E Hellman. O n Sharing Secret System. IEEE Transact ions on Informat ion Theory, 1983, 29: 35~ 418 T M atsumoto. Incidence St ruct ure f or K ey S haring. A dvance in Cryptology: A siacrypt c94, Lect ure Not es on Computer 917. Berlin: Springe-rverlag, 1995. 342~ 3539 A S hamir. H ow to S hare a Secret. Communicat ions of t he ACM, 1979, 22( 11) : 612~ 61310 D R St inson. Cryt ography Theory and Pract ice. Boca R at on; CR C Press, Inc, 199511 D R St inson. O n Some M ethods f or V ncondit ionally Secure K ey Dist ribution and Broadcast Encryption. D esigns, Codes and Cryptography,1997, 12: 215~ 24312 D R St inson. A n Ex plication of Secret S haring Scheme. D esigns, Codes and Cryptography, 1992, 4: 177~ 19113 G J Simmons( ed). Cont emporary Crypt ology. T he Science of Informat Integrit y. IEEE Press, 199214 B Schneier. A pplied Cryptography: Protocol. Algorit hm and Source Code in C John W iley & Sons, Inc, 1996 |