[1]
Li Xiao-hang,Wang Hong-xia,Zhang Wen-fang, et al. Information Security, Tsinghua University press,BEIJING, 2006.
Google Scholar
[2]
Shamir A.How to share a secret. Communications of the ACM,1979,22(11): 612- 613.
DOI: 10.1145/359168.359176
Google Scholar
[3]
Blakley G. Safeguarding cryptographic key. AFIPS 1979 Natl Conf,New York, USA, 1979.
Google Scholar
[4]
Dong Pan, Kuang Xiao-Hui, Lu Xi-Cheng.A Non-Interactive Protocol for Member Expansion in a Secret Sharing Scheme.Journal of Software,2005,16(1):116-120.
DOI: 10.1360/jos160116e
Google Scholar
[5]
Zhang Xue-zhen,Li Xiao,Luo Da-wen,et al.A New authentication scheme based on Computer Science and Software Engineering.Wuhan,China:IEEE Computer Society,2008:1028-1030.
Google Scholar
[6]
Zhang Xue-zhen,Li Xiao,Luo Da-wen,et al.A New Protocol of Member Expansion in a Secret Sharing Scheme.Journal of Xihua University,2010,29(3):76-80.
Google Scholar
[7]
Tian Y L,Peng C G,Zhang R P,et al.A practical publicly verifiable secret sharing scheme based on bilinear.2nd International Conference on Anti-counterfeiting,Security and Identification, 2008(ASID2008)//Guiyang,China:IEEE,2008:71-75.
DOI: 10.1109/iwasid.2008.4688348
Google Scholar
[8]
Wang F,Gu L,Zheng S,et al.A novel verifiable dynamic multi policy secret sharing scheme.The 12th International Conference on Advanced Communication Technology (ICACT 2010)//Paris France:IEEE,2010: 1474-1479.
Google Scholar
[9]
Li Da-wei,Yang Geng,Zhu Li.An ID Based Verifiable Secret Sharing Scheme.ACTA ELECTRONICA SINICA,2010,38(9):2059-2065.
Google Scholar
[10]
Luo H, Lu S. Ubiquitous and robust authentication services for Ad Hoc wireless networks. TR-200030,Department of Computer Science, UCLA, 2000.
Google Scholar
[11]
Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc. of the 1st Int'l Security in StorageWorkshop.2002.
Google Scholar
[12]
ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans on IT,1985,31(4):469-472.
DOI: 10.1109/tit.1985.1057074
Google Scholar
[13]
Pedersen TP. A threshold cryptosystem without a trusted party//Proc.of the Eurocrpt 1991. LNCS 547. Berlin:Springer-Verlag,1991.522- 526.
Google Scholar
[14]
Takaragi K,Miyazaki K.A threshold digital signature issuing scheme without secret communication//Proc. of the IEEE Conf.1998.
Google Scholar