1Wenliang Du and Zhijun Zhan. A practical approach to solve secre multi-party computa- tion problems [C]. //Proceedings of the 2002 Workshop on New Secure Paradigms, Virginia Beach, Virginia, USA, 2002:127-135.
2Blaldey G R. Safeguarding cryptographic keys [C]//Proceedings of the national Computer Conference American Federation of" Informa- tion Procession Societies.1979,48:313-317.
3Yang Chouchen,Chang Tingyi,Hwang Min-Shiang.A(t,n)Multi-secret Sharing Scheme[J].Applied Mathematics and Computation,2004,151(2):483-490.
4Pang Liaojun,Wang Yumin.A New(t,n)Multi-secret Sharing Scheme Based on Shamir's Secret Sharing[J].Applied Mathematics and Computation,2005,167(2):840-848.
5Li Huixian,Cheng Chuntian,Pang Liaojun.A New(t,n)Threshold Multi-secret Sharing Scheme[C]//Proceedings of the 25th Annual IACR Crypto'05.Berlin,Germany:Springer-Verlag,2005:421-426.
6Chien H Y,Jan J K,Tseng.Y M.A Practical(t,n)Multi-secret Sharing Scheme[J].IEICE Transactions on Fundamentals,2000,83(12):2762-2765.