[1] GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems[J]. Journal of Cryptology, 2007, 20(1):51-83. [2] PEDERSEN T. A threshold cryptosystem without a trusted party[C]//EUROCRYPT 1991:Proceedings of the 1991 Workshop on the Theory and Application of Cryptographic Techniques. Berlin:Springer, 1991:522-526. [3] 焦栋.门限秘密共享策略及其应用研究[D].大连:大连理工大学, 2014:21-36.(JIAO D. Research on threshold secret sharing scheme and its applications[D]. Dalian:Dalian University of Technology, 2014:21-36.) [4] YUAN H, ZHANG F, HUANG X, et al. Certificateless threshold signature scheme from bilinear maps[J]. Information Sciences, 2010, 180(23):4714-4728. [5] HERRANZ J, RUIZ A, SÁEZ G. Signcryption schemes with threshold unsigncryption, and applications[J]. Designs, Codes and Cryptology, 2014, 70(3):1-23. [6] BUDURUSHI J, NEUMANN S, OLEMBO M, et al. Pretty understandable democracy-a secure and understandable Internet voting scheme[C]//Proceedings of the 2013 Eighth IEEE International Conference on Availability, Reliability and Security. Piscataway, NJ:IEEE, 2013:198-207. [7] BASU A, SENGUPTA I, SING J K. Secured hierarchical secret sharing using ECC based signcryption[J]. Security Communication Networks, 2012, 5(7):752-763. [8] TENTU A N, PAUL P, VENKAIAH V C. Ideal and perfect hierarchical secret sharing schemes[J]. IACR Cryptology Eprint Archive, 2013, 3(4):23-32. [9] FARRAS O, PADRO C. Ideal hierarchical secret sharing schemes[J]. IEEE Transactions on Information Theory, 2012, 58(5):3273-3286. [10] 焦栋, 李明楚, 郭成, 等.可重用多属性多等级门限秘密共享[J].计算机工程与应用, 2014, 50(10):7-12.(JIAO D, LI M C, GUO C, et al. Reusable multi-attributes hierarchical threshold scheme[J]. Computer Engineering and Applications, 2014, 50(10):7-10.) [11] SIMMONS G J. How to (really) share a secret[C]//Proceedings of CRYPTO 1988, LNCS 403. Berlin:Springer, 1990:390-448. [12] BRICKELL E F. Some ideal secret sharing schemes[C]//EUROCRYPT 1989:Proceedings of the 1989 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 434. Berlin:Springer, 1990:468-475. [13] GHODOSI H, PIEPRZYK J, SAFAVI-NAINI R. Secret sharing in multilevel and compartmented groups[C]//ACISP 1998:Proceedings of the 3rd Australasian Conference on Information Security and Privacy, LNCS 1438. Berlin:Springer, 1998:367-378. [14] TASSA T. Hierarchical threshold secret sharing[J]. Journal of Cryptology, 2007, 20(2):237-264. [15] PAKNIAT H, NOROOZI M, ESLAMI Z. Distributed key generation protocol with hierarchical threshold access structure[J]. IET Information Security, 2015, 9(4):248-255. |