{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:10:34Z","timestamp":1737436234021,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_28","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"353-366","source":"Crossref","is-referenced-by-count":2,"title":["Secret Sharing with Public Reconstruction"],"prefix":"10.1007","author":[{"given":"Amos","family":"Beimel","sequence":"first","affiliation":[]},{"given":"Benny","family":"Chor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"4","key":"28_CR1","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R. Ahlswede","year":"1993","unstructured":"R. Ahlswede and I. Csiszar. Common Randomness in Information Theory and Cryptography \u2014 Part I: Secret Sharing. IEEE IT, 39(4):1121\u20131132, July 1993.","journal-title":"IEEE IT"},{"key":"28_CR2","series-title":"Lect Notes Comput Sci","first-page":"444","volume-title":"Interaction in Key Distribution Schemes","author":"A. Beimel","year":"1993","unstructured":"A. Beimel and B. Chor. Interaction in Key Distribution Schemes. To appear in IEEE IT. An extended abstract appears in Crypto\u2019 93, Springer-Verlag, LNCS 773, D.R. Stinson, ed. pp. 444\u2013455."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"M. Ben-Or and T. Rabin. Verifiable Secret sharing and Multiparty Protocols with Honest Majority. In Proceeding 21th STOC, pages 73\u201385. 1989.","DOI":"10.1145\/73007.73014"},{"key":"28_CR4","series-title":"Lect Notes Comput Sci","first-page":"251","volume-title":"CRYPTO\u2019 86","author":"J. Benaloh","year":"1986","unstructured":"J. Benaloh. Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret. In A. M. Odlyzko, editor, CRYPTO\u2019 86, volume 263 of LNCS, pages 251\u2013260."},{"key":"28_CR5","series-title":"Lect Notes Comput Sci","first-page":"27","volume-title":"CRYPTO\u2019 88","author":"J. Benaloh","year":"1988","unstructured":"J. Benaloh and J. Leichter. Generalized Secret Sharing and Monotone Functions. In S. Goldwasser, ed., CRYPTO\u2019 88, volume 403 of LNCS, pages 27\u201335."},{"key":"28_CR6","series-title":"Lect Notes Comput Sci","first-page":"540","volume-title":"CRYPTO\u2019 92","author":"B. Blakley","year":"1992","unstructured":"B. Blakley, G. R. Blakley, A. H. Chan, and J. Massey. Threshold Schemes with Disenrollment. In E. F. Brickell, ed., CRYPTO\u2019 92, vol. 740 of LNCS, pp. 540\u2013548."},{"key":"28_CR7","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley. Safeguarding Cryptographic Keys. In Proc. AFIPS 1979 NCC, vol. 48, pages 313\u2013317, June 1979.","journal-title":"Proc. AFIPS 1979 NCC"},{"key":"28_CR8","series-title":"Lect Notes Comput Sci","first-page":"335","volume-title":"Eurocrypt 84","author":"R. Blom","year":"1984","unstructured":"R. Blom. An Optimal Class of Symmetric Key Generation Systems. In T. Beth, N. Cot, and I. Ingemarsson, editors, Eurocrypt 84, volume 209 of LNCS, pages 335\u2013338. Springer-Verlag."},{"key":"28_CR9","series-title":"Lect Notes Comput Sci","first-page":"110","volume-title":"CRYPTO\u2019 93","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro. Fully Dynamic Secret Sharing Schemes. In D. R. Stinson, ed., CRYPTO\u2019 93, vol. 773 of LNCS, pages 110\u2013125."},{"key":"28_CR10","series-title":"Lect Notes Comput Sci","first-page":"471","volume-title":"CRYPTO\u2019 92","author":"C. Blundo","year":"1992","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-Secure Key Distribution for Dynamic Conferences. In E. F. Brickell, editor, CRYPTO\u2019 92, volume 740 of LNCS, pages 471\u2013486. Springer-Verlag, 1993."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"T. M. Cover and J. A. Thomas. Elements of Information Theory. John Wiley & Sons, 1991.","DOI":"10.1002\/0471200611"},{"issue":"6","key":"28_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE IT, 22(6):644\u2013654, 1976.","journal-title":"IEEE IT"},{"issue":"21","key":"28_CR13","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic Encryption. JCSS, 28(21):270\u2013299, 1984.","journal-title":"JCSS"},{"key":"28_CR14","unstructured":"M. Ito, A. Saito, and T. Nishizeki. Secret Sharing Schemes Realizing General Access Structure. In Proc. IEEE Globecom 87, pages 99\u2013102, 1987."},{"issue":"1","key":"28_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene, and M. E. Hellman. On Secret Sharing Systems. IEEE IT, 29(1):35\u201341, 1983.","journal-title":"IEEE IT"},{"key":"28_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-39568-7_19","volume-title":"CRYPTO\u2019 84","author":"S. C. Kothari","year":"1985","unstructured":"S. C. Kothari. Generalized Linear Threshold Scheme. In G. R. Blakley and D. Chaum, editors, CRYPTO\u2019 84, volume 196 of LNCS, pages 231\u2013241. Springer-Verlag, 1985."},{"issue":"3","key":"28_CR17","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. M. Maurer","year":"1993","unstructured":"U. M. Maurer. Secret Key Agreement by Public Discussion from Common Information. IEEE IT, 39(3):733\u2013742, May 1993.","journal-title":"IEEE IT"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R. J. McEliece","year":"1981","unstructured":"R. J. McEliece and D. V. Sarwate. On Sharing Secrets and Reed-Solomon Codes. Communications of the ACM, 24:583\u2013584, September 1981.","journal-title":"Communications of the ACM"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to Share a Secret. Communications of the ACM, 22:612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. An Introduction to Shared Secret and\/or Shared Control and their Application. In G. J. Simmons, editor, Contemporary Cryptology, pages 441\u2013497. IEEE Press, 1991.","DOI":"10.1007\/3-540-38424-3_16"},{"key":"28_CR21","first-page":"71","volume":"1","author":"G. J. Simmons","year":"1991","unstructured":"G. J. Simmons, W. Jackson, and K. M. Martin. The Geometry of Shared Secret Schemes. Bulletin of the ICA, 1:71\u201388, 1991.","journal-title":"Bulletin of the ICA"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T11:31:30Z","timestamp":1737372690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}