[1] Shamir A. How to share a secret[J]. Communications of the ACM, 1979,22(11):612-613.
[2] Blakley G R. Safeguarding cryptographic keys[C]// Proceedings of the 1979 AFIPS National Computer Conference. 1979,48:313-317.
[3] Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[C]// Proceedings of the 26th Annual Symposium on Foundations of Computer Science. 1985:383-395.
[4] Feldman P. A practical scheme for non-interactive verifiable secret sharing[C]// Proceedings of 28th IEEE Symposium on Foundations of Computer Science. 1987:427-437.
[5] Kun Peng. Efficient VSS free of computational assumption[J]. Journal of Parallel and Distributed Computing, 2011,71(12):1592-1597.
[6] Halpern J, Teague V. Rational secret sharing and multiparty computation: Extended abstract [C]// Proceedings of the 36th Annual ACM Symposium on Theory of Computing. 2004:623-632.
[7] Maleka S, Shareef A, Rangan C P. The deterministic protocol for rational secret sharing[C]// IEEE International Symposium on Parallel and Distributed Processing. 2008:1-7.
[8] Abraham I, Dolev D, Gonen R, et al. Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation[C]// Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing. 2006:53-62.
[9] Maleka S, Shareef A, Rangan C P. Rational secret sharing with repeated games[C]// Proceedings of the 4th International Conference on Information Security Practice and Experience. 2008:334-346.
[10]Cai Y Q, Peng X Y. Rational secret sharing protocol with fairness[J]. Chinese Journal of Electronics, 2012,21(1):149-152.
[11]Ong S J, Parkes D C, Rosen A, et al. Fairness with an honest minority and a rational majority[C]// Proceedings of the 4th Theory of Cryptography Conference. 2009:36-53.
[12]Lysyanskaya A, Triandopoulos N. Rationality and adversarial behavior in multi-party computation[C]// Proceedings of the 26th Annual International Conference on Advances in Cryptology. 2006:180-197.
[13]Asharov G, Lindell Y. Utility dependence in correct and fair rational secret sharing[J]. Journal of Cryptology, 2011,24(1):157-202.
[14]Moses Jr W K, Rangan C P. Rational secret sharing with honest players over an asynchronous channel[C]// Advances in Network Security and Applications. 2011,196:414-426.
|