[1] Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. [2] Blakley G R.Safeguaring cryptographic keys[C]//Proc.of AFIPS National Computer Conference,New York,1979:313-317. [3] Gray R.Agent Tcl:a flexible and secure mobile agent system[D].Hanover:Dartmouth College,1997. [4] Yang K,Liu D Y,Guo X.A template architecture for mobile Agent system of high security[J].Journal of Software,2002,13(1):130-135. [5] Feldman P.A practical scheme for non-interactive verifiable secret sharing[C]//Proc.of 28th IEEE Symposium on Foundations of Computer Science,IEEE Computer Society,1987:427-437. [6] Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Advances in Cruptology-CRYPTO,Lecture Notes in Computer Science,Berlin,1992,576:129-140. [7] Schoenmakers B.A simple publicly verifiable secret sharing scheme and its applications to electronic voting[C]//CRYPTO,Springer Verlag,1999:32-46. [8] Herzberg A,Jarecki S,Krawczyk H,et al.Proactive secret sharing or;how to cope with perpetual leakage[C]//Proc.of CRYPTO,Spring Verlag LNCS,1996:339-352. [9] Ye Zhenjun,Meng Fanzhen.Special secret sharing scheme with the function of assignment[J].Journal of Systems Engineering and Electronics,2005,16(3):651-653. [10] Ye Zhenjun,Meng Fanzhen.Secret sharing scheme with inherited characteristic[J].Journal of Systems Engineering and Electronics,2006,17(4):1671-1793. [11] Laszlo Csirnaz.Secret sharing schemes on graphs[J].Studia Mathematica,2007,44(3):297-306. [12] 叶振军,孙淑珍,李国东.有限秘密下指派秘密共享方案的构造[J].微电子学与计算机,2007,24(3):111-112;116. |