The following publications are possibly variants of this publication:
- A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary StructureJing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang. itiis, 8(12):4552-4567, 2014. [doi]
- A New (::::t::::, ::::n::::)-Threshold Multi-secret Sharing SchemeHui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang. cis 2005: 421-426 [doi]
- An Improved Multi-stage (::::t::::, ::::n::::)-Threshold Secret Sharing SchemeHui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang. waim 2005: 267-274 [doi]