{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:43Z","timestamp":1725496663921},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"},{"type":"electronic","value":"9783540384243"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-38424-3_17","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"242-252","source":"Crossref","is-referenced-by-count":8,"title":["Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"E. F.","family":"Brickell","sequence":"first","affiliation":[]},{"given":"D. R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology CRYPTO\u2019 88 Proceedings","author":"J. Beneloh","year":"1990","unstructured":"J. Beneloh and J. Leichter, Generalized secret sharing and monotone functions, in \u201cAdvances in Cryptology CRYPTO\u2019 88 Proceedings\u201d, Lecture Notes in Computer Science 403 (1990), 27\u201335."},{"key":"17_CR2","volume-title":"Design Theory","author":"Th. Beth","year":"1985","unstructured":"Th. Beth, D. Jungnickel and H. Lenz, Design Theory, Bibliographisches Institut, Zurich, 1985."},{"key":"17_CR3","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley, Safeguarding cryptographic keys, Proc. National Computer Conference, vol. 48, AFIPS Conference Proceedings 48 (1979), 313\u2013317.","journal-title":"Proc. National Computer Conference, vol. 48, AFIPS Conference Proceedings"},{"key":"17_CR4","first-page":"105","volume":"6","author":"E. F. Brickell","year":"1989","unstructured":"E. F. Brickell, Some ideal secret sharing schemes, J. Combin. Math. and Combin. Comput. 6 (1989), 105\u2013113.","journal-title":"J. Combin. Math. and Combin. Comput."},{"unstructured":"E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology, to appear.","key":"17_CR5"},{"unstructured":"M. Ito, A. Saito and T. Nishizeki, Secret sharing scheme realizing general access structure, Proc. IEEE Globecom\u2019 87, Tokyo, Japan, 1987, pp. 99\u2013102.","key":"17_CR6"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Commun. of the ACM 22, (1979), 612\u2013613.","journal-title":"Commun. of the ACM"},{"key":"17_CR8","first-page":"143","volume":"5","author":"P. J. Schellenberg","year":"1989","unstructured":"P. J. Schellenberg and D. R. Stinson, Threshold schemes from combinatorial designs, J. Combin. Math. and Combin. Comput. 5 (1989), 143\u2013160.","journal-title":"J. Combin. Math. and Combin. Comput."},{"key":"17_CR9","first-page":"215","volume":"68","author":"G. J. Simmons","year":"1989","unstructured":"Gustavus J. Simmons, Robust shared secret schemes or \u201chow to be sure you have the right answer even though you don\u2019t know the question\u201d, Congressus Numer. 68 (1989), 215\u2013248.","journal-title":"Congressus Numer"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1137\/0401024","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson and S. A. Vanstone, A combinatorial approach to threshold schemes, SIAM J. on Discrete Math. 1 (1988), 230\u2013236.","journal-title":"SIAM J. on Discrete Math."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T05:29:58Z","timestamp":1551158998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540545088","9783540384243"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1991]]}}}