{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:06:11Z","timestamp":1776881171945,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540602217","type":"print"},{"value":"9783540447504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_33","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"410-423","source":"Crossref","is-referenced-by-count":39,"title":["t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Satoshi","family":"Obana","sequence":"additional","affiliation":[]},{"given":"Wakaha","family":"Ogata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Comm.ACM, 22(1979), pp.612\u2013613.","journal-title":"Comm.ACM"},{"key":"33_CR2","first-page":"313","volume":"48","author":"G.R. Blakley","year":"1979","unstructured":"G.R. Blakley, Safeguarding cryptographic keys, Proc. National Computer Conference, AFIPS Conference Proceedings, 48(1979), pp.313\u2013317.","journal-title":"Proc. National Computer Conference, AFIPS Conference Proceedings"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R.J. McEliece","year":"1981","unstructured":"R.J. McEliece and D.V. Sarwate, On sharing secrets and Reed-Solomon codes, Comm.ACM, 24(1981), pp.583\u2013584.","journal-title":"Comm.ACM"},{"key":"33_CR4","first-page":"215","volume":"68","author":"G. Simmons","year":"1989","unstructured":"G. Simmons, Robust shared secret schemes or \u201chow to be sure you have the right answer even though you don\u2019t know the question,\u201d Congr.Numer., 68(1989), pp.215\u2013248.","journal-title":"Congr.Numer."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, Proc. 21st ACM Symposium on Theory of Computing (1989), pp.73\u201385.","DOI":"10.1145\/73007.73014"},{"issue":"4","key":"33_CR6","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1137\/0404044","volume":"4","author":"E.F. Brickell","year":"1991","unstructured":"E.F. Brickell and D.R. Stinson, The Detection of Cheaters in Threshold Schemes, SIAM J. DISC. MATH, Vol.4, No.4, Nov.1991, pp.502\u2013510.","journal-title":"SIAM J. DISC. MATH"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02252871","volume":"1","author":"M. Tompa","year":"1988","unstructured":"M. Tompa and H. Woll, How to share a secret with cheaters, Journal of Cryptology, vol.1(1988), pp.133\u2013138.","journal-title":"Journal of Cryptology"},{"key":"33_CR8","series-title":"Lect Notes Comput Sci","first-page":"118","volume-title":"Proceedings of Eurocrypt\u201993","author":"M. Carpentieri","year":"1993","unstructured":"Marco Carpentieri, Alfredo De Santis and Ugo Vaccaro, Size of Shares and Probability of Cheating in Threshold Schemes, Proceedings of Eurocrypt\u201993, Lecture Notes in Computer Science, LNCS 765, Springer Verlag (1993), pp.118\u2013125."},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"IT-29","author":"E.D. Karnin","year":"1983","unstructured":"E.D. Karnin, J.W. Greene, and M.E. Hellman, On Secret Sharing Systems, IEEE Trans. on Inform. Theory, Vol.IT-29 (1983), pp.35\u201341.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"33_CR10","series-title":"Lect Notes Comput Sci","first-page":"101","volume-title":"Proceedings of Crypto\u201991","author":"R.M. Capocelli","year":"1991","unstructured":"R.M. Capocelli, A. De Santis, L. Gargano and U. Vaccaro, On the size of shares for secret sharing schemes, Proceedings of Crypto\u201991, Lecture Notes in Computer Science, LNCS 576, Springer Verlag (1991), pp.101\u2013113."},{"key":"33_CR11","unstructured":"K. Kurosawa and K. Okada, Combinatorial interpretation of secret sharing schemes, In Pre-Proceedings of Asiacrypt\u201994 (1994), pp.38\u201348."},{"key":"33_CR12","volume-title":"The science of information integrity","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, A survey of Information Authentication, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York (1992)."},{"key":"33_CR13","first-page":"161","volume":"45","author":"G.J. Simmons","year":"1984","unstructured":"G.J. Simmons, Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), pp.161\u2013192.","journal-title":"Congr. Numer."},{"key":"33_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D.R. Stinson","year":"1988","unstructured":"D.R. Stinson, Some constructions and bounds for authentication codes, Journal of Cryptology, vol.1 (1988), pp.37\u201351.","journal-title":"Journal of Cryptology"},{"key":"33_CR15","unstructured":"J.L. Massey, Cryptography \u2014 a selective survey, in Digital Communications, North-Holland (pub.) (1986), pp.3\u201321."},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/BF00196910","volume":"3","author":"M. Soete De","year":"1991","unstructured":"M. De Soete, New Bounds and Constructions for Authentication\/Secrecy Codes with Splitting, Journal of Cryptology, vol.3, no.3 (1991), pp.173\u2013186.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T22:37:52Z","timestamp":1587854272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}