C. Asmuth
J. Bloom
1983
A modular approach to key safeguarding
IEEE Transactions on Information Theory
29
2
208–211
10.1109/TIT.1983.1056651
A. Behnad
T. Eghlidos
2008
A new, publicly verifiable, secret sharing scheme
Sci. Iran.
15
2
246–251
G. R. Blakley
1979
Safeguarding cryptographic keys
Managing Requirements Knowledge, International Workshop on
0
313
10.1109/AFIPS.1979.98
F. Boudot
J. Traoré
1999
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery
Proceedings of the Second International Conference, ICICS’99
0302-9743
Springer-Verlag
Berlin, Heidelberg
87–102
10.1007/978-3-540-47942-0_8
B. Chor
S. Goldwasser
S. Micali
B. Awerbuch
1985
Verifiable secret sharing and achieving simultaneity in the presence of faults
Proceedings of the 26th Annual Symposium on Foundations of Computer Science
SFCS '85
IEEE Computer Society
Washington, DC, USA
383–395
10.1109/SFCS.1985.64
P. Feldman
1987
A practical scheme for non-interactive verifiable secret sharing
Proceedings of the 28th Annual Symposium on Foundations of Computer Science
SFCS '87
IEEE Computer Society
Washington, DC, USA
427–438
10.1109/SFCS.1987.4
A. Fiat
A. Shamir
1986
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings
Lecture Notes in Computer Science
263
Springer
186–194
10.1007/3-540-47721-7_12
E. Fujisaki
T. Okamoto
1998
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
Proceedings of the annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'98
Springer-Verlag
Berlin, Heidelberg
32–46
10.1007/BFb0054115
S. Heidarvand
J. L. Villar
2009
Selected Areas in Cryptography
Public Verifiability from Pairings in Secret Sharing Schemes
Springer-Verlag
Berlin, Heidelberg
294–308
10.1007/978-3-642-04159-4_19
M. P. Jhanwar
2011
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
ISPEC'11
273–287
E. D. Karnin
J. W. Greene
M. E. Hellman
1983
On secret sharing systems
IEEE Transactions on Information Theory
29
1
35–41
10.1109/TIT.1983.1056621
P. Paillier
1999
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
EUROCRYPT
223–238
10.1007/3-540-48910-X_16
T. Pedersen
1992
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '91
Springer-Verlag
London, UK, UK
129–140
10.1007/3-540-46766-1_9
A. Ruiz
J. L. Villar
2005
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem
WEWoRC
98–108
http://subs.emis.de/LNI/Proceedings/Proceedings74/article3801.html
B. Schoenmakers
1999
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '99
Springer-Verlag
London, UK, UK
148–164
10.1007/3-540-48405-1_10
A. Shamir
1979
How to share a secret
Commun. ACM
22
11
612–613
10.1145/359168.359176
A. Ben Shil
K. Blibech
R. Robbana
2012
Un nouveau schéma de partage de secrets publiquement vérifiable
Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI)
M. Stadler
1996
Publicly verifiable secret sharing
Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'96
Springer-Verlag
Berlin, Heidelberg
190–199
10.1007/3-540-68339-9_17
T. Y. Wu
Y. M. Tseng
2011
A pairing-based publicly verifiable secret sharing scheme
Journal of Systems Science and Complexity
24
1
186–194
10.1007/s11424-011-8408-6
A. Young
M. Yung
2001
A PVSS as Hard as Discrete Log and Shareholder Separability
Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '01
Springer-Verlag
London, UK, UK
287–299
10.1007/3-540-44586-2_21
J. Yu
F. Kong
R. Hao
2007
Publicly Verifiable Secret Sharing with Enrollment Ability
SNPD (3)
194–199
10.1109/SNPD.2007.435