C. Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret, CRYPTO '86, pp.251-260

F. Boudot and J. Traore, Efficient public verifiable secret sharing schemes with fast or delayed recovery, ICICS '99, pp.87-102
DOI : 10.1007/978-3-540-47942-0_8

C. Cachin, . Kursawe, R. Lysyanskaya, and . Strobl, Asynchronous verifiable secret sharing and proactive cryptosystems, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.88-97
DOI : 10.1145/586110.586124

D. Chaum, C. Crepeau, and I. Damgård, Multiparty unconditionally secure protocols (extended abstract), Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC1988, pp.11-19, 1988.
DOI : 10.1007/3-540-48184-2_43

P. Feldman, A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437
DOI : 10.1109/SFCS.1987.4

M. Fitzi, . Garay, C. Gollakota, K. Rangan, and . Srinathan, Round-Optimal and Efficient Verifiable Secret Sharing, TCC '06, pp.329-342
DOI : 10.1007/11681878_17

E. Fujisaki and T. Okamoto, A practical and provably secure scheme for publicly verifiable secret sharing and its applications, EUROCRYPT '98, pp.32-46
DOI : 10.1007/BFb0054115

R. Gennaro and S. Micali, Verifiable Secret Sharing as Secure Computation, EUROCRYPT '95, pp.168-182
DOI : 10.1007/3-540-49264-X_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.3110

T. Pedersen, Distributed Provers with Applications to Undeniable Signatures, EUROCRYPT '91, pp.221-242
DOI : 10.1007/3-540-46416-6_20

T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, CRYPTO '91, pp.129-140
DOI : 10.1007/3-540-46766-1_9

K. Peng and F. Bao, Efficient publicly verifiable secret sharing with correctness, WISA '09, LNCS5932, pp.118-132
DOI : 10.1007/978-3-642-10838-9_10

T. Rabin and M. Ben-or, Verifiable secret sharing and multiparty protocols with honest majority, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.73-85
DOI : 10.1145/73007.73014

B. Schoenmakers, A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting, CRYPTO '99, pp.149-164
DOI : 10.1007/3-540-48405-1_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.9375

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

M. Stadler, Publicly Verifiable Secret Sharing, EUROCRYPT '96, pp.190-199
DOI : 10.1007/3-540-68339-9_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.153