{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:27Z","timestamp":1725490527160},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_17","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"224-236","source":"Crossref","is-referenced-by-count":1,"title":["A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Nojiri","sequence":"first","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai, \u201cOn the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem,\u201d Proc. of CRYPTO\u201987, LNCS 293, Springer-Verlag, pp.185\u2013193, 1988."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"An Optimal Class of Symmetric Key Generation Systems","author":"R. Blom","year":"1985","unstructured":"R. Blom, \u201cAn Optimal Class of Symmetric Key Generation Systems,\u201d Proc. of Eurocrypt\u201984, LNCS 209, Springer-Verlag, pp.335\u2013338, 1985."},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Perfectly Secure Key Distribution for Dynamic Conferences","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, \u201cPerfectly Secure Key Distribution for Dynamic Conferences,\u201d Proc. of CRYPTO\u2019 92, LNCS 740, Springer-Verlag, pp.471\u2013486, 1993."},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/3-540-68697-5_29","volume-title":"Trade-offs between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution","author":"C. Blundo","year":"1996","unstructured":"C. Blundo, L.A. Frota Mattos and D.R. Stinson, \u201cTrade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution,\u201d Proc. of CRYPTO\u201996, LNCS 1109, Springer-Verlag, pp. 387\u2013400, 1996."},{"key":"17_CR5","first-page":"51","volume":"2","author":"L. Gong","year":"1993","unstructured":"L. Gong and D. J. Wheeler, \u201cA Matrix Key-Distribution Scheme,\u201d Journal of Cryptology, vol. 2, pp.51\u201359, Springer-Verlag, 1993.","journal-title":"Journal of Cryptology"},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-48329-2_11","volume-title":"Multisecret Threshold Schemes","author":"W. A. Jackson","year":"1994","unstructured":"W. A. Jackson, K. M. Martin, and C. M. O'Keefe, \u201cMultisecret Threshold Schemes,\u201d Proc. of CRYPTO\u201993, LNCS 773, pp.126\u2013135, Springer-Verlag, 1994."},{"key":"17_CR7","unstructured":"Y. Desmedt and V. Viswanathan, \u201cUnconditionally Secure Dynamic Conference Key Distribution,\u201d IEEE, ISIT\u201998, 1998."},{"key":"17_CR8","series-title":"Lect Notes Comput Sci","first-page":"480","volume-title":"Broadcast Encryption","author":"A. Fiat","year":"1995","unstructured":"A. Fiat and M. Naor, \u201cBroadcast Encryption,\u201d Proc. of CRYPTO\u201993, LNCS 773, Springer-Verlag, pp.480\u2013491, 1994."},{"key":"17_CR9","series-title":"Lect Notes Comput Sci","first-page":"348","volume-title":"An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks","author":"G. Hanaoka","year":"2004","unstructured":"G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, \u201cAn Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks,\u201d Proc. of Asiacrypt\u201999, LNCS 1716, Springer-Verlag, pp.348\u2013362, 1999."},{"key":"17_CR10","series-title":"Lect Notes Comput Sci","first-page":"157","volume-title":"Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks","author":"G. Hanaoka","year":"2004","unstructured":"G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, \u201cOptimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks,\u201d Proc. of The Second International Conference on Information and Communication Security (ICICS\u201999), LNCS 1726, Springer-Verlag, pp.157\u2013168, 1999."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1023\/A:1008229625895","volume":"15","author":"K. Kurosawa","year":"1998","unstructured":"K. Kurosawa, K. Okada, H. Saido and D. Stinson, \u201cNew Combimatorial Bounds for Authentication Codes and Key Predistribution Schemes,\u201d Designs, Codes and Cryptography, 15, pp.87\u2013100, 1998.","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/3-540-49649-1_33","volume-title":"Some Bounds and a Construction for Secure Broadcast Encryption","author":"K. Kurosawa","year":"1998","unstructured":"K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, \u201cSome Bounds and a Construction for Secure Broadcast Encryption,\u201d Proc. of Asiacrypt\u201998, LNCS 1514, Springer-Verlag, pp. 420\u2013433, 1998."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/18.481774","volume":"42","author":"A. Beimel","year":"1996","unstructured":"A. Beimel and B. Chor, \u201cCommunication in key destribution schemes,\u201d IEEE Transactions on Information Theory, 42, pp.19\u201328, 1996.","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1023\/A:1008268610932","volume":"12","author":"D. Stinson","year":"1997","unstructured":"D. Stinson, \u201cOn Some Methods for Unconditionally Secure Key Distribution System and Broadcast Encryption,\u201d Designs, Codes and Cryptography, 12, pp.215\u2013243, 1997.","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR15","unstructured":"Y. Shibuya, G. Hanaoka and H. Imai, \u201cOn the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography,\u201d Proc. of Joint Workshop on Information Security and Cryptology 2000 (JWISC2000), pp.207\u2013212, 2000."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T04:05:01Z","timestamp":1550894701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}