1Shamir A. How to Share a Secret [ J ]. Communications of the ACM,1979,22( ll ) :612-613.
2Blakley G. Safeguarding Cryptographic Keys [ C ]//Pro- ceedings of AFIPS National Computer Conference. New York, USA : AFIPS Press, 1979 : 313-317.
3Mignotte M. How to Share a Secret E C ]//Proceedings of Workshop on Cryptography. Berlin, Germany: Springer-Verlag, 1983 : 371-375.
4Asmuth C A, Bloom J. A Modular Approach to Key Safeguarding [ J ]. IEEE Transactions on Information Theory, 1983,29 (2) :208-210.
5Karnin E D, Greene J W, Hellman M E. On Sharing Secret Systems[ J ]. IEEE Transactions on Information Theory, 1983,29 ( 1 ) :35-41.
6Bertilsson M, lngemrsson I. A Construction of Practical Secret Sharing Schemes Using Linear Block Codes : C l// Proceedings of AUSCRYPT' 92. Berlin, Germany : Springer- Verlag, 1992:67-79.