[1] A. Beimel. “Secret-sharing schemes: A survey”. Coding and Cryptology 6639, 11–46, 2011.
[2] A. Beimel, T. Tassa, E. Weinreb. “Characterizing Ideal Weighted Threshold Secret Sharing”. SIAM J. Discrete Math. 22, 360–397, 2008.
[3] A. Beimel, E. Weinreb. “Monotone Circuits for Monotone Weighted Threshold Functions”. Information Processing Letters 97, 12–18, 2006.
[4] G.R. Blakley. “Safeguarding cryptographic keys”. En Proc. AFIPS 48, 313–317, 1979.
[5] E.F. Brickell. “Some ideal secret sharing schemes”. J. Combin. Math. and Combin. Comput. 9, 105–113, 1989.
[6] M.J. Collins. “A Note on Ideal Tripartite Access Structures”. Cryptology ePrint Archive: Report 2002/193. 2002. Online: http://eprint.iacr.org/2002/193.
[7] O. Farràs, J. Martí-Farré, C. Padró. “Ideal Multipartite Secret Sharing Schemes”. En Proc. EUROCRYPT 2007, Lecture Notes in Computer Science 4515, 448–465. Springer, 2007.
[8] O. Farràs, C. Padró. “Ideal Hierarchical Secret Sharing Schemes”. En Proc. TCC 2010, Lecture Notes in Computer Science 5978, 219–236. Springer, 2010.
[9] H. Ghodosi, J. Pieprzyk, R. Savavi-Naini. “Secret Sharing in Multilevel and Compartmented Groups”. En Proc. ACISP 98, Lecture Notes in Computer Science 1438, 367–378. Springer, 1998.
[10] J. Herranz, G. Sáez. “New Results on Multipartite Access Structures”. En Proc. IEE Proceedings of Information Security 153, 153–162, 2006.
[11] M. Ito, A. Saito, T. Nishizeki. “Secret sharing scheme realizing any access structure”. En Proc. IEEE Globecom 1987, 99–102, IEEE Computer Society, Washington, DC, USA, 1987.
[12] E.D. Karnin, J.W. Greene, M.E. Hellman. “On secret sharing systems”. IEEE Trans. Inform. Theory 29, 35–41, 1983.
[13] P. Morillo, C. Padró, G. Sáez, J.L. Villar. “Weighted Threshold Secret Sharing Schemes”. Inf. Process. Lett. 70, 211–216, 1999.
[14] S.L. Ng. “Ideal secret sharing schemes with multipartite access structures”. IEE Proc.-Commun. 153, 165–168, 2006.
[15] C. Padró, G. Sáez. “Secret sharing schemes with bipartite access structure”. IEEE Trans. Inform. Theory 46, 2596–2604, 2000.
[16] C. Padró, G. Sáez. “Correction to Secret Sharing Schemes With Bipartite Access Structure”. IEEE Trans. Inform. Theory 50, 1373–1373, 2004.
[17] A. Shamir. “How to share a secret”. Commun. of the ACM 22, 612–613, 1979.
[18] G.J. Simmons. “How to (Really) Share a Secret”. En Proc. CRYPTO 1988, Lecture Notes in Computer Science 403, 390–448. Springer, 1990.
[19] D.R. Stinson. “An explication of secret sharing schemes”. Des. Codes Cryptogr. 2, 357–390, 1992.
[20] T. Tassa. “Hierarchical Threshold Secret Sharing”. J. Cryptology 20, 237–264, 2007.
[21] T. Tassa, N. Dyn. “Multipartite Secret Sharing by Bivariate Interpolation”. J. Cryptology 22, 227–258, 2009.