[1] 杨保华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:9-19.(YANG B H, CHEN C. Blockchain Principle, Design and Application[M]. Beijing:China Machine Press, 2017:9-19.)
[2] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11):612-613.
[3] 张毅,侯整风,胡东辉.一种动态的无可信中心(t,n)门限签名认证方案[J].合肥工业大学学报(自然科学版),2011,34(9):1341-1344.(ZHANG Y, HOU Z F, HU D H. A dynamic (t,n) threshold signature authentication scheme without a trusty party[J]. Journal of Hefei University of Technology (Natural Science Edition), 2011, 34(9):1341-1344.)
[4] 王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584.(WANG B, LI J H. A (t,n) threshold signature scheme without a trusted party[J]. Chinese Journal of Computers, 2003,26(11):1581-1584.)
[5] HARN L. Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J]. IEEE Proceedings-Computers and Digital Techniques, 1994, 141(5):307-313.
[6] 何二庆, 侯整风, 朱晓玲. 一种无可信中心动态秘密共享方案[J]. 计算机应用研究, 2013,30(2):491-493.(HE E Q, HOU Z F, ZHU X L. Proactive secret sharing scheme without trusted party[J]. Application Research of Computers, 2013 30(2):491-493.)
[7] 殷凤梅,濮光宁.允许新成员加入的无可信中心秘密共享方案分析[J].重庆科技学院学报(自然科学版),2011,13(6):173-182.(YIN F M, PU G N. New member joining in a secret sharing scheme without a trusted party[J]. Journal of Chongqing University of Science and Technology (Natural Science Edition), 2011,13(6):173-182.)
[8] 徐甫.基于多项式秘密共享的前摄性门限RSA签名方案[J]. 电子与信息学报, 2016, 38(9):2280-2286.(XU F. Proactive threshold RSA signature scheme based on polynomial secret sharing[J]. Journal of Electronics & Information Technology, 2016, 38(9):2280-2286.)
[9] ASMUTH C, BLOOM J. A modular approach to key safeguarding[J]. IEEE Transactions on Information Theory, 1983,29(2):208-210.
[10] 杨阳,朱晓玲,丁凉.基于中国剩余定理的无可信中心可验证秘密共享研究[J].计算机工程,2015,41(2):122-128.(YANG Y, ZHU X L, DING L. Research on verifiable secret sharing without trust center based on Chinese remainder theorem[J].Computer Engineering, 2015, 41(2):122-128.)
[11] 程宇,刘焕平.可验证的Asmuth-Bloom门限秘密共享方案[J].哈尔滨师范大学自然科学学报,2011,27(3):35-38.(CHENG Y, LIU H P. The Asmuth-Bloom verifiable threshold sharing scheme[J]. Natural Science Journal of Harbin Normal University, 2011, 27(3):35-38.)
[12] 王岩,侯整风,章雪琪,等. 基于中国剩余定理的动态门限签名方案[J]. 计算机应用, 2018, 38(4):1041-1045.(WANG Y, HOU Z F, ZHANG X Q, et al. Dynamic threshold signature scheme based on Chinese remainder theorem[J]. Journal of Computer Applications, 2018, 38(4):1041-1045.)
[13] 徐甫,马静谨.基于中国剩余定理的门限RSA签名方案的改进[J].电子与信息学报,2015,37(10):2495-2500.(XU F, MA J J. Improvement of threshold RSA signature scheme based on Chinese remainder theorem[J]. Journal of Electronics & Information Technology, 2015,37(10):2495-2500.)
[14] 李洁平, 韦性佳. 基于中国剩余定理的秘密共享方案[J]. 通信技术,2018,51(3):671-675.(LI J P, WEI X J. Secret sharing scheme based on Chinese remainder theorem[J]. Communications Technology, 2018, 51(3):671-675.)
[15] LI Q, WANG Z, NIU X, et al. A non-interactive modular verifiable secret sharing scheme[C]//Proceedings of the 2005 International Conference on Communications, Circuits and Systems. Piscataway, NJ:IEEE, 2005,1:84-87.
[16] KAYA K, SELCUK A A. A verifiable secret sharing scheme based on the Chinese remainder theorem[C]//Proceedings of the 2008 International Conference on Cryptology in India, LNCS 5365. Berlin:Springer, 2008:414-425.
[17] 董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议[J]. 软件学报,2005, 16(1):116-120.(DONG P, KUANG X H, LU X C. A non-interactive protocol for member expansion in a secret sharing scheme[J]. Journal of Software, 2005, 16(1):116-120.)
[18] 曹阳.基于秘密共享的数字签名方案[J].重庆邮电大学学报(自然科学版),2015,27(3):418-421.(CAO Y. Digital signature scheme based on secret sharing[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2015, 27(3):418-421.)
[19] 王利朋,胡明生,贾志娟,等.基于中国剩余定理的区块链投票场景签名方案[J].计算机应用研究, 2020, 37(2):1-8.(WANG L P, HU M S, JIA Z J,et al. Signature scheme applying on blockchain voting scene based on Chinese remainder theorem[J]. Application Research of Computers, 2020, 37(2):1-8.)
[20] BLAHUT R E.现代密码学及其应用[M].黄玉划,薛明福,徐娟,译.北京:机械工业出版社,2018:67-68.(BLAHUT R E. Cryptography and Secure Communication[M]. HUANG Y H, XUE M F, XU J, translated. Beijing:China Mechine Press, 2018:67-68.
[21] 闵嗣鹤,严士健.初等数论[M].3版.北京:高等教育出版社,2003:76-79.(MIN S H, YAN S J. Elementary Number Theory[M]. 3rd edition. Beijing:Higher Education Press, 2003:76-79.)
[22] HOU Z, TAN M. A CRT-based (t,n) threshold signature scheme without a dealer[J]. Journal of Computational Information Systems, 2015,11(3):975-986. |