[1] |
Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
|
[2] |
Blakley G R.Safeguarding cryptographic keys[C]∥Proc of 1979 International Workshop on Managing Requirements Knowledge,1979:313-318.
|
[3] |
Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
|
[4] |
Karnin E D,Greene J,Hellman M E.On secret sharing systems[J].IEEE Transactions on Information Theory,1983,29(1):35-41.
|
[5] |
Li X P, Chang C C,Liu Y J.A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network[J].Telecommunication Systems,2021,78(1):49-56.
|
[6] |
Meghrajani Y K,Desai L S,Mazumdar H S.Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share[J].Journal of Information Security and Applications,2019,47:267-274.
|
[7] |
Zhang Yan-shuo,Li Wen-jing,Chen Lei,et al.Verifiable special threshold secret sharing scheme based on eigenvalue[J].Journal on Communications,2018,39(8):169-175.(in Chinese)
|
[8] |
Gu Ting,Jian Xiao-ming,Peng Xiao-liang,et al.Public verifiable and renewable multi-secret sharing without trusted centers[J].Application Research of Computers,2020,37(S1):293-297.(in Chinese)
|
[9] |
Pang Liao-jun,Pei Qing-qi,Jiao Li-cheng,et al. An identity (ID)-based threshold multi-secret sharing scheme [J].Journal of Software,2008,19(10):2739-2745.(in Chinese)
|
[10] |
Zhang Jian, Lin Chang-lu,Ding Jian,et al. Secure multi-use threshold multi-secret sharing scheme[J].Computer Systems & Applications,2021,30(5):276-281.(in Chinese)
|
[11] |
Li Li,Yang Hong-fei,Dong Xiu-ze. Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J].Journal of Computer Applications,2021,41(11):3251-3256.(in Chinese)
|
[12] |
Li Jing. Research on data encryption and secret sharing schemes based on access structures[D].Beijing:Beijing University of Posts and Telecommunications,2017.(in Chinese)
|
[13] |
Song Yi-xuan.Research on secret sharing schemes for two typical access structures [D].Lanzhou:Lanzhou University,2021.(in Chinese)
|
[14] |
Chiou G H, Chen W T.Secure broadcasting using the secure lock[J].IEEE Transactions on Software Engineering,1989,15(8):929-934.
|
[15] |
Boneh D, Franklin M.Identity-based encryption from the Weil pairing[C]∥Proc of the 21st Annual International Cryptology Conference on Advances in Cryptology,2001:213-229.
|
[16] |
Pang L J,Wang Y M.A new (t,n)multi-secret sharing scheme based on Shamir’s secret sharing[J].Applied Mathematics and Computation,2005,167(2):840-848.
|
|
附中文参考文献:
|
[7] |
张艳硕,李文敬,陈雷,等.基于特征值的可验证特殊门限秘密共享方案[J].通信学报,2018,39(8):169-175.
|
[8] |
谷婷,简小明,彭晓良,等.无可信中心可公开验证可更新的多秘密共享[J].计算机应用研究,2020,37(S1):293-297.
|
[9] |
庞辽军,裴庆祺,焦李成,等.基于ID的门限多重秘密共享方案[J].软件学报,2008,19(10):2739-2945.
|
[10] |
张剑,林昌露,丁健,等.一种安全的多使用门限多秘密共享方案[J].计算机系统应用,2021,30(5):276-281.
|
[11] |
李莉,杨鸿飞,董秀则.基于身份多条件代理重加密的文件分级访问控制方案[J].计算机应用,2021,41(11):3251-3256.
|
[12] |
李婧.基于访问结构的数据加密与共享协议的研究[D].北京:北京邮电大学,2017.
|
[13] |
宋祎璇.两种典型访问结构的秘密共享方案研究[D].兰州:兰州大学,2021.
|