[1] LI G, CHENG X. Research status and scientific thinking of big data [J]. Bulletin of the Chinese Academy of Sciences, 2012, 27(6): 647-657.(李国杰,程学旗.大数据研究:未来科技及经济社会发展的重大战略领域[J].中国科学院院刊,2012,27(6):647-657.) [2] CAMPBELL N. Community cleverness required [J]. Nature, 2008, 455(7209): 1-1. [3] McNUTT M. Dealing with data [J]. Science, 2011, 331(6018): 639-806. [4] FENG D, ZHANG M, LI H. Big date security and privacy protec-tion [J]. Chinese Journal of Computers, 2014, 37(1): 243-258.(冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):243-258.) [5] SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613. [6] BLAKLEY G R. Safeguarding cryptographic keys [C]// Proceed-ings of the 1979 AFIPS National Computer Conference. Monval: AFIPS Press, 1979: 313-317. [7] KURIHARA J, KIYOMOTO S, FUKUSHIMA K, et al. A new (k,n)-threshold secret sharing scheme and its extension [C]// Proceedings of the 11th International Conference on Information Security, LNCS 5222. Berlin: Springer, 2008: 455-470. [8] YANG C, LAI J. Protecting data privacy and security for cloud computing based on secret sharing [C]// ISBAST 2013: Proceedings of the 2013 International Symposium on Biometrics and Security Technologies. Piscataway: IEEE, 2013: 259-266. [9] van DIJK M. On the information rate of perfect secret sharing schemes [J]. Designs, Codes and Cryptography, 1995, 6(2): 143-169. [10] PLANK J S, XU L. Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications [C]// Proceedings of the 5th IEEE International Symposium on Network Computing and Applications. Piscataway: IEEE, 2006: 1-11. [11] LIDL R, NIEDERREITER H, COHN P M. Finite fields [M]. Cambridge: Cambridge University Press, 1997: 264-300. [12] MacWILLIAMS F J, SLOANE N J A. The theory of error-correcting codes [M]. New York: North Holland Publishing Company, 1977: 124-186. [13] McELIECE R J, SARWATE D V. On sharing secrets and Reed-Solomon codes [J]. Communications of the ACM, 1981, 24(9): 583-584. [14] LIN S, COSTELLO D J. Error control coding: fundamentals and applications [M]. Upper Saddle River: Pearson-Prentice Hall, 2004: 312-334. [15] GEISELMANN W, STEINWANDT R. Hardware to solve sparse systems of linear equations over GF(2) [C]// CHES 2003: Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2779. Berlin: Springer, 2003: 51-61. [16] COPPERSMITH D. Solving linear-equations over GF(2)-block Lanczos-algorithm [J]. Linear Algebra and Its Applications, 1993, 192: 33-60. |