{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:53:29Z","timestamp":1772812409233,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":18,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_28","type":"book-chapter","created":{"date-parts":[[2007,11,8]],"date-time":"2007-11-08T21:05:53Z","timestamp":1194555953000},"page":"307-315","source":"Crossref","is-referenced-by-count":545,"title":["Threshold cryptosystems"],"prefix":"10.1007","author":[{"given":"Yvo","family":"Desmedt","sequence":"first","affiliation":[]},{"given":"Yair","family":"Frankel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","volume-title":"A modular approach to key safeguarding","author":"C. Asmuth","year":"1980","unstructured":"C. Asmuth and J. Bloom. A modular approach to key safeguarding. Technical report, Math Dept., Texas A & M Univ., College Station, Tx., 1980."},{"key":"28_CR2","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley. Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc, pages 313\u2013317, 1979. vol.48.","journal-title":"Proc. Nat. Computer Conf. AFIPS Conf. Proc"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"I. F. Blake, P. C. van Oorschot, and S. Vanstone. Complexity issues for public key cryptography. In J. K. Skwirzynski, editor, Performance Limits in Communication, Theory and Practice, NATO ASI Series E: Applied Sciences-VoL 142, pages 75\u201397. Kluwer Academic Publishers, 1988. Proceedings of the NATO Advanced Study Institute II Ciocco, Castelvecchio Pascoli, Tuscany, Italy, July 7\u201319, 1986.","DOI":"10.1007\/978-94-009-2794-0_5"},{"issue":"2","key":"28_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84\u201388, February 1981.","journal-title":"Commun. ACM"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaum","year":"1988","unstructured":"D. Chaum. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65\u201375, 1988.","journal-title":"Journal of Cryptology"},{"key":"28_CR6","volume-title":"Cryptography and Data Security","author":"D. E. R. Denning","year":"1982","unstructured":"D. E. R. Denning. Cryptography and Data Security. Addison \u2014 Wesley, Reading, Mass., 1982."},{"key":"28_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt. Society and group oriented cryptography: a new concept. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pages 120\u2013127. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16\u201320."},{"issue":"6","key":"28_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31:469\u2013472, 1985.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"28_CR10","unstructured":"Y. Frankel. A practical protocol for large group oriented networks. Presented at Eurocrypt\u201989, Houthalen, Belgium, to appear in: Advances in Cryptology. Proc. of Eurocrypt\u201989 (saLecture Notes in Computer Science), Springer-Verlag, April 1989."},{"issue":"1","key":"28_CR11","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1):186\u2013208, February 1989.","journal-title":"Siam J. Comput."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the Nineteenth ACM Symp. Theory of Computing, STOC, pages 218\u2013229, May 25\u201327, 1987.","DOI":"10.1145\/28395.28420"},{"key":"28_CR13","unstructured":"L. C. Guillou and J. J. Qisquater. A \u201cpardoxical\u201d identity-based signature scheme resulting from zero-knowledge. Presented at Crypto\u201988, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto\u201988 (saLecture Notes in Computer Science), Springer-Verlag, August 1988."},{"key":"28_CR14","first-page":"276","volume":"5","author":"R.C. Mullin","year":"1985","unstructured":"R.C. Mullin I.F. Blake, R. Fuji-Hara and S.A. Vanstone. Computing logrithms in a finite field of characteristic two. SIAM J. Alg. Disc. Meth., 5:276\u2013285, 1985.","journal-title":"SIAM J. Alg. Disc. Meth."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"N. Koblitz. A Course in Number Theory and Cryptology. Springer-Verlang, 1987.","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"28_CR16","series-title":"Lect Notes Comput Sci","first-page":"224","volume-title":"Advances in Cryptology, Proc. of Eurocrypt\u201984","author":"A. M. Odlyzko","year":"1984","unstructured":"A. M. Odlyzko. Discrete logs in a finite field and their cryptographic significance. In N. Cot T. Beth and I. Ingemarsson, editors, Advances in Cryptology, Proc. of Eurocrypt\u201984 (Lecture Notes in Computer Science 209), pages 224\u2013314. Springer-Verlag, 1984. Paris, France April 1984."},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Commun. ACM, 22:612\u2013613, November 1979.","journal-title":"Commun. ACM"},{"key":"28_CR18","unstructured":"G. J. Simmons. How to (really) share a secret. Presented at Crypto\u201988, Santa Barbara, California, U.S.A., to appear in: Advances in Cryptology. Proc. of Crypto\u201988 (saLecture Notes in Computer Science), Springer-Verlag, August 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T01:28:10Z","timestamp":1619486890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_28","relation":{},"subject":[]}}