参考文献/References:
[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.DOI:10.1145/359168.359176.
[2] BLAKLEY G R.Safeguarding cryptographic keys[C]//Proceedings of Managing Requirements Knowledge, International Workshop on IEEE Computer Society.New York:IEEE Press,1979:313-318.DOI:10.1109/MARK.1979.8817296.
[3] ASMUTH C A,BLOOM J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.DOI:10.1109/TIT.1983.1056651.
[4] HARN L,HSU C,ZHANG Mingwu,et al.Realizing secret sharing with general access structure[J].Information Sciences,2016,367/368:209-220.DOI:10.1016/j.ins.2016.06.006.
[5] JIA Xingxing,GUO Yusheng,LUO Xiangyang,et al.A perfect secret sharing scheme for general access structures[J].Information Sciences,2022,595:54-69.DOI:10.1016/j.ins.2022.02.016.
[6] CHOR B,GOLDWASSER S,MICALI S,et al.Verifiable secret sharing and achieving simultaneity in the presence of faults[C]//Proceedings of the 26th IEEE Symposium on the Foundations of Computer Science.Portland:IEEE Press,1985:383-395.DOI:10.1109/SFCS.1985.64.
[7] HILLERY M,BU?EK V,BERTHIAUME A.Quantum secret sharing[J].Physical Review A,1999,59(3):1829-1834.DOI:10.1103/PhysRevA.59.1829.
[8] SENTHOOR K,SARVEPALLI P K.Communication efficient quantum secret sharing[J].Physical Review A,2019,100(5):052313.DOI:10.1103/PhysRevA.100.052313.
[9] LIPINSKA V,MURTA G,RIBEIRO J,et al.Verifiable hybrid secret sharing with few qubits[J].Physical Review A,2020,101(3):032332.DOI:10.1103/PhysRevA.101.032332.
[10] HARN L,HSU C,ZHE Xia.A novel threshold changeable secret sharing scheme[J].Frontiers of Computer Science,2022,16:161807.DOI:10.1007/s11704-020-0300-x.
[11] HALPERN J Y,TEAGUE V.Rational secret sharing and multiparty computation: Extended abstract[C]//Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing.New York:ACM,2004:623-632.DOI:10.1145/1007352.1007447.
[12] GORDON S D,KATZ J.Rational secret sharing, revisited[C]//International Conference on Security and Cryptography for Networks.Berlin:Springer,2006:229-241.DOI:10.1007/11832072_16.
[13] MAITEA A,DE S J,PAUL G,et al.Proposal for quantum rational secret sharing[J].Physical Review A,2015,92(2):022305.DOI:10.1103/PhysRevA.92.022305.
[14] QIN Huawang,TANG W K S,TSO R.Rational quantum secret sharing[J].Scientific Reports,2018,8:11115.DOI:10.1038/s41598-018-29051-z.
[15] HERZBERG A,JARECKI S,KRAWCZYK H,et al.Proactive secret sharing or: How to cope with perpetual leakage[C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology.Berlin:Springer,1995:339-352.DOI:10.1007/3-540-44750-4_27.
[16] DEHKORDI M H,MASHHADI S,ORAEI H.A proactive multi stage secret sharing scheme for any given access structure[J].Wireless Personal Communications,2019,104(1):491-503.DOI:10.1007/s11277-018-6032-7.
[17] 邵奇峰,金澈清,张召,等.区块链技术: 架构及进展[J].计算机学报,2018,41(5):969-988.DOI:10.11897/SP.J.1016.2018.00969.
[18] 秦波,陈李昌豪,伍前红,等.比特币与法定数字货币[J].密码学报,2017,4(2):176-186.DOI:10.13868/j.cnki.jcr.000172.
[19] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.DOI:10.7544/issn1000-1239.2017.20170471.
[20] 刘敖迪,杜学绘,王娜,等.区块链技术及其在信息安全领域的研究进展[J].软件学报,2018,29(7):2092-2115.DOI:10.13328/j.cnki.jos.005589.
[21] 曾诗钦,霍如,黄韬,等.区块链技术研究综述: 原理、进展与应用[J].通信学报,2020,41(1):134-151.DOI:10.11959/j.issn.1000-436x.2020027.
[22] 刘明达,陈左宁,拾以娟,等.区块链在数据安全领域的研究进展[J].计算机学报,2021,44(1):1-27.DOI:10.11897/SP.J.1016.2021.00001.
[23] 夏清,窦文生,郭凯文,等.区块链共识协议综述[J].软件学报,2021,32(2):277-299.DOI:10.13328/j.cnki.jos.006150.
[24] 徐恪,凌思通,李琦,等.基于区块链的网络安全体系结构与关键技术研究进展[J].计算机学报,2021,44(1):55-83.DOI:10.11897/SP.J.1016.2021.00055.
[25] 张利华,张赣哲,曹宇,等.基于区块链的智能家居认证与访问控制方案[J].计算机应用研究,2022,39(3):863-867,873.DOI:10.19734/j.issn.1001-3695.2021.08.0321.
[26] 卫宏儒,李思月,郭涌浩.基于智能合约的秘密重建协议[J].计算机科学,2022,49(6A):469-473.DOI:10.11896/jsjkx.210700033.
[27] 张亮,刘百祥.区块链与秘密分享融合技术综述[J].计算机工程,2022,48(8):1-11.DOI:10.19678/j.issn.1000-3428.0064102.