2HE J, DAWSON E. Multi-stage secret sharing scheme based on one- way function [ J]. Electronic Letters, 1994, 30(19) : 1591 - 1594.
3SHAMIR A. How to share a secret[ J]. Communications of the ACM, 1979,22 (11):612-613.
4HARN L. Comment: multistage secret sharing scheme based on one- way function [ J]. Electronic Letters, 1995, 31 (4) : 262 - 262.
5HE J, DAWSON E. Multisecret sharing scheme based on one-way function[ J]. Electronic Letters, 1995, 31 (2) : 93 - 95.
6CHANG T, HWANG M, YANG W. A new multi-stage secret sharingscheme using one-way function[ J]. ACM SIGOPS Operating Systems Review, 2005, 39(1) : 48 - 55.
7CHOR B, GOLDWASSER S, MICALI S, et al. Verifiable secret sha- ring and achieving simultaneity in the presence of faults [ C]// SFCS '85: Proceedings of the 26th Annual Symposium on Founda- tions of Computer Science. Washington, DC: IEEE Computer Socie- ty, 1985:383 -395.
8HARN L. Efficient sharing(broadcasting) of multiple secret[ J]. Computer and Digitial Techniques, 2005, 152(3) : 237 - 240.
9LINT Y, WU T C. ( t, n) threshold verifiable multi-secret sharing scheme based on factorization intractability and discrete logarithm modulo a composite problem [ J]. Computer and Digitial Tech- niques, 2009, 156(5) : 264 - 268.
10HE W H, WU T S. Comment on Lin-Wu ( t, n) -threshold verifiable multi-secret sharing scheme[ J]. Computer and Digitial Techniques, 2011, 158(3) : 139.