{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:18Z","timestamp":1725475818699},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_37","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"457-470","source":"Crossref","is-referenced-by-count":15,"title":["Sharing Block Ciphers"],"prefix":"10.1007","author":[{"given":"Ernie","family":"Brickell","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giovanni","family":"Di Crescenzo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yair","family":"Frankel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, B., Bellare, M., Di Crescenzo, G., Venkatesan, R.: Security Amplification by Composition: the case of Doubly-Iterated, Ideal Ciphers. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, p. 390. Springer, Heidelberg (1998)","DOI":"10.1007\/BFb0055743"},{"key":"37_CR2","unstructured":"Boyd, C.: Digital Multisignatures. In: Proc. of IMA Conference on Cryptography and Coding. Claredon Press (1989)"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J.C. Benaloh","year":"1990","unstructured":"Benaloh, J.C., Leichter, J.: Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proc. of Nat. Computer Conf. AFIPS 1979 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"37_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/BF00198463","volume":"6","author":"R.M. Capocelli","year":"1993","unstructured":"Capocelli, R.M., De Santis, A., Gargano, L., Vaccaro, U.: On the Size of Shares for Secret Sharing Schemes. Journal of Cryptology\u00a06, 57\u2013167 (1993)","journal-title":"Journal of Cryptology"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"De Santis, A., Desmedt, Y., Frankel, Y., Yung, M.: How to Share a Function Securely. In: Proc. of STOC 1994 (1994)","DOI":"10.1145\/195058.195405"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/3-540-46766-1_37","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"Y. Desmedt","year":"1992","unstructured":"Desmedt, Y., Frankel, Y.: Shared Generation of Authenticators and Signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 457\u2013469. Springer, Heidelberg (1992)"},{"issue":"4","key":"37_CR8","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. Desmedt","year":"1994","unstructured":"Desmedt, Y.: Threshold Cryptography. European Transactions on Telecommunications\u00a05(4), 449\u2013457 (1994)","journal-title":"European Transactions on Telecommunications"},{"issue":"4","key":"37_CR9","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1137\/S0895480192224713","volume":"7","author":"Y.G. Desmedt","year":"1994","unstructured":"Desmedt, Y.G., Frankel, Y.: Homomorphic Zero-Knowledge Threshold Schemes Over Any Finite Abelian Group. SIAM Journal on Discrete Mathematics\u00a07(4), 667\u2013679 (1994)","journal-title":"SIAM Journal on Discrete Mathematics"},{"issue":"11","key":"37_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communication of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communication of the ACM"},{"key":"37_CR11","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret Sharing Scheme Realizing General Access Structure. In: Proc. of IEEE Global Telecommunications Conference, Globecom 1987 (1987)"},{"issue":"4","key":"37_CR12","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. Shannon","year":"1949","unstructured":"Shannon, C.: Communication Theory of Secrecy Systems. Bell Systems Technical Journal\u00a028(4), 656\u2013715 (1949)","journal-title":"Bell Systems Technical Journal"},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D.R. Stinson","year":"1992","unstructured":"Stinson, D.R.: An Explication of Secret Sharing Schemes. Design, Codes and Cryptography\u00a02, 357\u2013390 (1992)","journal-title":"Design, Codes and Cryptography"},{"key":"37_CR14","unstructured":"Stinson, D.R.: Bibliography on Secret Sharing Schemes (October 2, 1997), http:\/\/bibd.unl.edu\/stinson\/ssbib.html"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,19]],"date-time":"2020-04-19T15:19:08Z","timestamp":1587309548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/10718964_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}