[1] Shamir A.How to share a secret.Communications of the ACM[J].1979,24(11):612-613. [2] Blakley G R.Safeguarding cryptographickeys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,New York:1979.48:313-317. [3] 李大伟,杨庚,朱莉.一种基于身份加密的可验证秘密共享方案[J].电子学报,2010,38(9):2059-2065. Li D W,Yang G.Zhu L.An ID based verifiable secret sharing scheme[J].Acta Electronica Sinica,2010,38(9):2059-2065.(in Chinese) [4] Jin Y,Ding C S.Secret sharing schemes from three classes of linear codes[J].IEEE Trans.Inform.Theory,2006,52(1):206-212. [5] 温晓军,田原,牛夏牧.一种基于秘密共享的量子强盲签名协议[J].电子学报,2010,38(3):720-724. Wen X J,Tian Y,Niu X M. A strong blind quantum signature protocol based on secret sharing[J].Acta Electronica Sinica,2010,38(3):720-724.(in Chinese) [6] Stinson D R.Cryptography Theory and Practice[M].3rd ed,UnitedStates:2009. [7] Massey J L.Minimal codewords and secret sharing[A].The 6th Joint Swedish-Russian Workshop on Information Theory[C].Netherlands:Veldhoven,1993.276-279. [8] Massey J L.Some Applications of Coding Theory in Cryptography [M].Cryptography and Coding IV,England:Formara Ltd,1995:33-47. [9] Ding C S ,Jin Y.Covering and secret sharing with linear codes[A].Discrete Mathematics and Theoretical Computer Science:Lecture Notes in Computer Science[C].Berlin:Springer Verlag,2003.2731:11-25. [10] Li Z H ,Xue T,Lai H.Secret sharing schemes from binary linear codes[J].Information Science,2011,180(22):4412-4419. [11] Ding C S.The weight distribution of some irreducible cyclic codes[J].IEEE Trans Inform Theory,2009,55(3):955-960. [12] Vega G,Wolfmann J.New classes of 2-weight cyclic codes[J].Designs,Codes and Cryptography,2007,42(3):327-334. |