[1] SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
[2] 刘忆宁.基于秘密分享的信息安全协议[M].西安:西安电子科技大学出版社, 2015.
[3] 杨波.现代密码学(第3版)[M].北京:清华大学出版社, 2015.
[4] ANDERSON R, MOORE T. The economics of information security[J]. Science, 2006, 314(5799):610-613.
[5] ASHAROV G, LINDELL Y. Utility dependence in correct and fair rational secret sharing[C]//Advances in Cryptology - CRYPTO 2009. Berlin: Springer, 2009: 559-576.
[6] CHAN C W, CHANG C C. A scheme for threshold multi-secret sharing[J]. Applied Mathematics and Computation, 2005, 166(1): 1-14.
[7] TIAN Y L, MA J F, PENG C G, et al. A rational framework for secure communication[J]. Information Sciences, 2013, 250: 215-226.
[8] 田有亮,彭长根.基于双线性对的可验证秘密共享方案[J].计算机应用, 2007, 27(S2):125-127.
[9] 田有亮,彭长根.基于双线性对的可验证秘密共享及其应用[J].计算机工程, 2009, 35(10):158-161.
[10] 田有亮,马建峰,彭长根,等.秘密共享体制的博弈论分析[J].电子学报, 2011, 39(12):2790-2795.
[11] 田有亮,马建峰,彭长根,等.椭圆曲线上的信息论安全的可验证秘密共享方案[J].通信学报, 2011, 32(12): 96-102.
[12] 张志芳,刘木兰.理性密钥共享的扩展式博弈模型[J].中国科学:信息科学, 2012, 42(1):32-46.
[13] HALPERN J, TEAGUE V. Rational secret sharing and multiparty computation: extended abstract[C]//Proceedings of the 36th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 2004: 623-632.