The following publications are possibly variants of this publication:
- A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theoremZhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu. scn, 8(18):3592-3601, 2015. [doi]
- Applying cheating identifiable secret sharing scheme in multimedia securityZheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Yanxiao Liu. ejivp, 2020(1):42, 2020. [doi]
- Cheating identifiable (k, n) threshold quantum secret sharing schemeChenhong Yan, Zhihui Li, Lu Liu, Dianjun Lu. qip, 21(1):8, 2022. [doi]
- An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme Based on Symmetric bivariate polynomialsChristophe Tartary, Huaxiong Wang, Yun Zhang. ijfcs, 22(6):1395-1416, 2011. [doi]