[1] M. Bellare, A. Boldyreva, S. Micali, Public-key encryption in a multi-user setting: Security proofs and improvements, in: Proceeding of Euro-crypt'00, in: LNCS, 1807, Springer-Verlag, 2000, pp. 259-274.
[2] M. Bellare, A. Desai, E. Jokipii, P. Rogaway, A concrete security treatment of symmetric encryption, in: FOCS'97, IEEE Society Press, 1997, pp. 394-403.
[3] M. Bellare, P. Rogaway, Introduction to modern cryptography, Notes for the course CSE207 of the University of California, San Diego, available at http://cseweb.ucsd.edu/classes/sp99/cse207/index.html, visited at November 2012.
[4] C. Cachin, On-line secret sharing, in Proceedings of IMA Conference'95, in: LNCS, 1025, Springer-Verlag, 1995, pp. 190-198.
[5] T.Y. Chang, M. S. Hwang, W. P.Yang, A new multi-stage secret sharing scheme using one-way function, ACM SIGOPS Operating Systems, 39, 2005, pp. 48-55.
[6] H.-Y. Chien, J.-K. Jan, Y.-M. Tseng, A practical (t, n) multi-secret sharing scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer 83-A, 12, 2000, pp. 2762-2765.
[7] M. H. Dehkordi, S. Mashhadi, New efficient and practical verifiable multi-secret sharing schemes, Information Sciences 178, 9, 2008, pp. 2262-2274.
[8] J. He, E. Dawson, Multistage secret sharing based on one-way function, Electronics Letters 30, 19, 1994, pp. 1591-1592.
[9] J. Herranz, A. Ruiz, G. Sáez, Sharing many secrets with computational provable security, Information Processing Letters 113, 2013, pp. 572-579.
[10] C. Hu, X. Liao, X. Cheng, Verifiable multi-secret sharing based on LFSR sequences, Theoret. Commun. Sci. 445, 2012, pp. 52-62.
[11] M. Karchmer, A. Wigderson, On Span Programs, in: Proceeding of SCTC'93, IEEE Computer Society Press, 1993, pp. 102-111.
[12] J. Katz, Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall/CRC, New York, 2008.
[13] J. Katz, M. Yung, Characterization of security notions for probabilistic private-key encryption, Journal of Cryptology, 19, 2006, pp. 67-95.
[14] H. Krawczyk, Secret sharing made short, in: Proceedings of Crypto'93, in LNCS, 773, Springer-Verlag, 1993, pp. 136-146.
[15] H. X. Li, C. T. Cheng, L. J. Pang, An improved Multi-stage (t, n)-threshold secret sharing scheme, LNCS 3739, 2005, pp. 267-274.
[16] H. Y. Lin, Y. S. Yeh, Dynamic multi-secret sharing scheme, Int. J. Contemp. Math. Sciences, 3, 2008, pp. 37-42.
[17] S. Mashhadi, M. Hadian Dehkordi, Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem, Information Sciences 294, 2015, pp. 31-40.
[18] B. Masucci, Sharing multiple secret: Models, schemes and analysis, Designs, Codes and Cryptography, 39, 2006, pp. 89-111.
[19] A. Shamir, How to share a secret, Communications of the ACM. 22, 1979, pp. 612-613.
[20] C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t, n) multi-secret sharing scheme, Applied Mathematics and Computation 151, 2004, pp. 483-490.