{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:37Z","timestamp":1764996817448},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_29","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T04:39:53Z","timestamp":1187239193000},"page":"367-371","source":"Crossref","is-referenced-by-count":10,"title":["On General Perfect Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"G. R.","family":"Blakley","sequence":"first","affiliation":[]},{"given":"G. A.","family":"Kabatianski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"29_CR1","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley, Safeguarding cryptographic keys, Proceedings of AFIPS 1979 National Computer Conference, vol.48, N. Y., 1979, pp. 313\u2013317.","journal-title":"Proceedings of AFIPS 1979 National Computer Conference"},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Communications of the ACM, vol.22, no.1, 1979, pp. 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R. J. McEliece","year":"1981","unstructured":"R. J. McEliece and D. V. Sarwate, On secret sharing and Reed-Solomon codes, Communications of the ACM, vol. 24, 1981, pp. 583\u2013584.","journal-title":"Communications of the ACM"},{"issue":"1","key":"29_CR4","first-page":"231","volume":"29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Transactions on Informatiom Theory, vol. 29, no. 1, 1983, pp. 231\u2013241.","journal-title":"IEEE Transactions on Informatiom Theory"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/BF00198463","volume":"6","author":"R. M. Capocelli","year":"1993","unstructured":"R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, Journal of Cryptology, vol. 6, 1993, pp. 157\u2013167.","journal-title":"Journal of Cryptology"},{"key":"29_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00196772","volume":"4","author":"E. F. Brickell","year":"1991","unstructured":"E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, Journal of Cryptology, vol. 4, 1991, pp. 123\u2013134.","journal-title":"Journal of Cryptology"},{"key":"29_CR7","unstructured":"W.-A. Jackson and K. M. Martin, Combinatorial models for perfect secret sharing schemes, Submitted to Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, vol.2, 1992, pp. 357\u2013390.","journal-title":"Designs, Codes and Cryptography"},{"key":"29_CR9","unstructured":"K. M. Martin, Discrete structures in the theory of secret sharing, Ph. D. thesis, University of London, 1991."},{"key":"29_CR10","unstructured":"D. J. A. Welsh, Matroid Theory, Academic Press, 1976."},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"K. Kurosawa, K. Okada, K. Sakano, W. Ogata and S. Tsujii, Nonperfect secret sharing schemes and matroids, Advances in Cryptology\u2014EUROCRYPT\u201993, Lect. Notes in Comput. Sci. vol. 765, 1993, pp. 126\u2013141.","DOI":"10.1007\/3-540-48285-7_11"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T18:37:55Z","timestamp":1587839875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}