8Lee, N Y. Threshold signature scheme with multiple signing policies[ J ]. IEE Proc-Computers and Digital Techniques, 2001,148(2) :95 - 99.
9Chart C W, Chang C C. A scheme for threshold multi-secret sharing[ J]. Applied Mathematics and Computation, 2005, 166 (1):1 - 14.
10Cornelli F, Damiani E, Vimercati D C. Choosing reputable servents in a P2P network//Proceedings of the 11th International Conference on World Wide Web (WWW'02). Hawaii, USA, 2002:441-449.