1SHAMIR A. How to share a secret [ J]. Communications of the ACM, 1979,22(11) : 612 -613.
2BLAKLEY G R. Safeguarding eryptographie keys[ C]//Proceedings of the AFIPS 1979 National Computer Conference. Montvale, NJ, USA: AFIPS Press, 1979,48:313-317.
3HERZBERG A, JARECKI S, KRAWCZYK H, et al. Proactive secret sharing or: how to cope with perpetual leakage[ C]// Proceedings of 15th Annual International Clyptology Conference, LNCS 963. Berlin: Springer-Verlag, 1995:339-352.
4TZENG W G. A secure fault-tolerant conference-key agreement protocol [ J]. IEEE Transactions on Computers, 2002, 51 (4) : 373 - 379.
5CHAUM D , PEDERSEN T P . Wallet databases with observers [ C]// Proceedings of 12th Annual International Cryptology Conference, LNCS 740. Berlin: Springer-Veda.g, 1993:89-105.
6CHAUM D , PEDERSEN T P . Wallet databases with observers [C]// Proceedings of International Conference on the Theory and Application of Cryptographic Techniques( EUROCRYPT'92), LNCS 658. Berlin: Springer-Verlag, 1993:390-407.
2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
3Herzberg A, Jarecki S, Krawczyk H, et al. Proacfive Secret Sharing or: How to Cope with Perpetual Leakage[C]//Proc. of the 15th Annual Int'l Cryptology Conf.. Berlin, Germany: Springer-Verlag, 1995.
4Tzeng W G. A Secure Fault-tolerant Conference-key Agreement Protocol[J]. IEEE Trans. on Computers, 2002, 51(4): 373-379.
5Bresson E, Catalano D. Constant Round Authenticated Group Key Agreement via Distributed Computation[C]//Proc. of Conf. on Public Key Cryptography. Berlin, Germany: Springer-Verlag, 2004.
6Fouque P A, Poupard G Sten J. Sharing Description in the Context of Voting or Lotteries[C]//Proc. of Conf. on Financial Cryptography. Berlin, Germany: Springer-Verlag, 2000.
7A.Shamir,"Identity-based crypto systems and signature schemes,"in Proc.Crypto-84,Santa Barbara,CA.1984.
8S.Tsujii,T.Itho,and K.Kurosawa.ID-based cryptosystem using discrete logarithm problem.Electron.Lett.Vol.23.1987.
9E.Okamoto and K.Tanaka.Identity-based information security management system for personal computer networks.IEEE J.Select.Areas Commun.,Vol.7.1989.
10J.Hastad.On using RSA with low exponent in a public key network.in Lecture Notes in Computer Science:Advances in Cryptology-CRYPTO'85 Proc.