{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:41:12Z","timestamp":1775745672312,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":8,"publisher":"Springer New York","isbn-type":[{"value":"9780387971964","type":"print"},{"value":"9780387347998","type":"electronic"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_3","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:17:36Z","timestamp":1186348656000},"page":"27-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":344,"title":["Generalized Secret Sharing and Monotone Functions"],"prefix":"10.1007","author":[{"given":"Josh","family":"Benaloh","sequence":"first","affiliation":[]},{"given":"Jerry","family":"Leichter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"3_CR1","volume-title":"A Modular Approach to Key Safeguarding","author":"C. Asmuth","year":"1980","unstructured":"Asmuth, C. and Bloom, J. \u201cA Modular Approach to Key Safeguarding.\u201d Texas A&M University, Department of Mathematics, College Station, TX (1980)."},{"key":"3_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-47721-7_19","volume-title":"Proc. Crypto\u2019 86","author":"J. Benaloh","year":"1986","unstructured":"Benaloh, J. \u201cSecret Sharing Homomorphism: Keeping Shares of a Secret Secret\u201d Proc. Crypto\u2019 86, Santa Barbara, CA (Aug. 1986), 251\u2013260. Published as Advances in Cryptology, ed. by A. Odlyzko in Lecture Notes in Computer Science, vol. 263, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1987)."},{"key":"3_CR3","unstructured":"Benaloh, J. \u201cVerifiable Secret-Ballot Elections.\u201d Ph.D. Thesis presented at Yale University (Sep. 1987)."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Blakley, G. \u201cSafeguarding Cryptographic Keys.\u201d Proc. AFIPS 1979 National Computer Conference, New York, NY (June 1979), 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"3_CR5","unstructured":"Feldman, P. \u201cA Practical Scheme for Non-interactive Verifiable Secret Sharing.\u201d Proc. 28thIEEE Symp. on Foundations of Computer Science, Los Angeles, CA (Oct. 1987), 427\u2013437."},{"key":"3_CR6","unstructured":"Ito, M., Saito, A., and Nishizeki, T. \u201cSecret Sharing Scheme Realizing General Access Structure.\u201d Proc. Glob. Com, (1987)."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Kothari, S. \u201cGeneralized Linear Threshold Scheme.\u201d Proc. Crypto\u2019 84, Santa Barbara, CA (Aug. 1984), 231\u2013241. Published as Advances in Cryptology, ed. by G. Blakley and D. Chaum in Lecture Notes in Computer Science, vol. 196, ed. by G. Goos and J. Hartmanis. Springer-Verlag, New York (1985).","DOI":"10.1007\/3-540-39568-7_19"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"11","author":"A. Shamir","year":"1979","unstructured":"Shamir, A. \u201cHow to Share a Secret.\u201d Comm. ACM 22, 11 (Nov. 1979), 612\u2013613.","journal-title":"Comm. ACM 22"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T10:26:10Z","timestamp":1576146370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}