{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:39:34Z","timestamp":1759091974197},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_17","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T19:22:37Z","timestamp":1181157757000},"page":"237-252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Threshold MACs"],"prefix":"10.1007","author":[{"given":"Keith M.","family":"Martin","sequence":"first","affiliation":[]},{"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[]},{"given":"Rei","family":"Safavi-Naini","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peter R.","family":"Wild","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","first-page":"340","volume-title":"Advances in Cryptology-Crypto\u201994","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian and P. Rogaway, The security of cipher block chaining: message authentication codes, Advances in Cryptology-Crypto\u201994, LNCs, 839 (1994), 340\u2013358. (Also appeared in Journal of Computer and System Sciences Vol.61, No. 3, 2000, 362-399) 239, 241"},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"Advances in Cryptology-Crypto\u201995","author":"M. Bellare","year":"1995","unstructured":"M. Bellare, R. Guerin and P. Rogaway, XOR MACs: New methods for message authentication, Advances in Cryptology-Crypto\u201995, LNCs, 963 (1995), 15\u201328."},{"key":"17_CR3","unstructured":"J. Black, Message authentication codes, PhD thesis, University of California, Davis, 2000."},{"key":"17_CR4","unstructured":"S.R. Blackburn. Combinatorics and Threshold Cryptography, in Combinatorial Designs and their Applications, Chapman and Hall\/CRC Research Notes in Mathematics, 403, F. C. Holroyd, K.A. S. Quinn, C. Rowley and B. S. Web (Eds.), CRCPress, London (1999) 49\u201370. 250"},{"key":"17_CR5","unstructured":"D. Boneh, G. Durfee and M. Franklin, Lower Bounds for Multicast Message Authentication, Advances in Cryptology-Eurocrypt\u201901, Lecture Notes in Comput. Sci."},{"key":"17_CR6","unstructured":"C. Boyd, Digital multisignatures, Cryptography and coding (Beker and Piper eds.), Clarendon Press, 1989, 241\u2013246. 238"},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Information Security and Privacy","author":"E. Brickell","year":"2000","unstructured":"E. Brickell, G. Di Crescenzo and Y. Frankel, Sharing Block Ciphers, Information Security and Privacy, Lecture Notes in Computer Science, ACISP2000, 2000. 239"},{"key":"17_CR8","first-page":"120","volume":"293","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, Society and group oriented cryptology: a new concept, Advances in Cryptography-CRYPTO\u2019 87, Lecture Notes in Comput. Sci. 293, 1988, 120\u2013127. 238","journal-title":"Advances in Cryptography-CRYPTO\u2019 87"},{"key":"17_CR9","unstructured":"Y. Desmedt, Y. Frankel and M. Yung, Multi-receiver\/Multi-sender network security: efficient authenticated multicast\/feedback, IEEE Infocom\u201992, (1992) 2045\u20132054. 239"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1023\/A:1008261021505","volume":"14","author":"M. Dijk van","year":"1998","unstructured":"M. van Dijk, C. Gehrmann and B. Smeets, Unconditionally Secure Group Authentication, Designs, Codes and Cryptography, 14( 1998), 281\u2013296. 239","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF02772959","volume":"51","author":"P. Erd\u00f6s","year":"1985","unstructured":"P. Erd\u00f6s, P. Frankl, and Z. Furedi, Families of finite sets in which no set is covered by the union of r others, Israel Journal of Mathematics, 51(1985), 79\u201389. 246, 247","journal-title":"Israel Journal of Mathematics"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Y. Frankel, P. MacKenzie and M. Yung, Robust efficient distributed RSA-key generation, in Proc. 30th STOC, 663\u2013672, ACM, 1998. 238","DOI":"10.1145\/276698.276882"},{"key":"17_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/BFb0028469","volume-title":"Information and Communications Security","author":"K. Martin","year":"1997","unstructured":"K. Martin and R. Safavi-Naini, Multisender Authentication Schemes with Unconditional Security, Information and Communications Security, LNCS, 1334 (1997), 130\u2013143. 239"},{"key":"17_CR14","first-page":"248","volume":"239","author":"K. Martin","year":"2002","unstructured":"K. Martin, R. Safavi-Naini, H. Wang and P. Wild, Distributing the Encryption and Decryption of a Block Cipher. Preprint, 2002. 239, 244, 248, 250","journal-title":"Preprint"},{"key":"17_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-44750-4_15","volume-title":"Advancesin Cryptology: CRYPTO\u2019 95","author":"S. Micali","year":"1995","unstructured":"S. Micali and R. Sidney. A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. Advancesin Cryptology: CRYPTO\u2019 95, Lecture Notes in Computer Science, 963(1995), 185\u2013195. 239, 244"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1976","unstructured":"A. Shamir, How to Share a Secret, Communications of the ACM, 22 (1976), 612\u2013613. 245","journal-title":"Communications of the ACM"},{"key":"17_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology-Eurocrypt\u201999","author":"V. Shoup","year":"2000","unstructured":"V. Shoup, Practical Threshold Signature, Advances in Cryptology-Eurocrypt\u201999, LNCS, 1807(2000), 207\u2013222. 238"},{"key":"17_CR18","first-page":"71","volume":"1","author":"G. J. Simmons","year":"1991","unstructured":"G. J. Simmons, W.-A. Jackson and K. Martin. The Geometry of Shared Secret Schemes, Bulletin of the ICA, 1 (1991), 71\u201388.","journal-title":"Bulletin of the ICA"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0378-3758(99)00131-7","volume":"86","author":"D. R. Stinson","year":"2000","unstructured":"D. R. Stinson, T. van Trung and R. Wei, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures, J. Statist. Plan. Infer., 86(2000), 595\u2013617. 247","journal-title":"J. Statist. Plan. Infer."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1006\/jcta.1999.3036","volume":"90","author":"D. S. Stinson","year":"2000","unstructured":"D. S. Stinson, R. Wei and L. Zhu, Some new bounds for cover-free families, Journal of Combinatorial Theory, A, 90(2000), 224\u2013234. 247","journal-title":"Journal of Combinatorial Theory, A"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T09:44:47Z","timestamp":1558259087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}