{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T05:11:12Z","timestamp":1744348272512,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_6","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"71-88","source":"Crossref","is-referenced-by-count":4,"title":["Size of Broadcast in Threshold Schemes with Disenrollment"],"prefix":"10.1007","author":[{"given":"S. G.","family":"Barwick","sequence":"first","affiliation":[]},{"given":"W. -A.","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Peter R.","family":"Wild","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"6_CR1","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley. Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference, 48 (1979) 313\u2013317.","journal-title":"Proceedings of AFIPS 1979 National Computer Conference"},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/3-540-48071-4_38","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"B. Blakley","year":"1993","unstructured":"B. Blakley, G.R. Blakley, A.H. Chan and J.L. Massey. Threshold schemes with disenrollment. In Advances in Cryptology-CRYPTO\u201992, LNCS 740 Springer-Verlag, Berlin (1993) 540\u2013548."},{"key":"6_CR3","series-title":"Lect Notes Comput Sci","first-page":"110","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. Cresti, A. De Santis and U. Vaccaro. Fully dynamic secret sharing schemes. In Advances in Cryptology-CRYPTO\u2019 93, LNCS 773, Springer, Berlin (1993) 110\u2013125."},{"key":"6_CR4","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"T.M. Cover and J.A. Thomas. Elements of Information Theory, John Wiley & Sons, New York (1991)."},{"key":"6_CR5","unstructured":"Y. Desmedt and S. Jajodia. Redistributing secret shares to new access structures and its applications. Preprint (1997)."},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E.D. Karnin","year":"1983","unstructured":"E.D. Karnin, J.W. Greene and M.E. Hellman. On secret sharing systems. IEEE Trans. on Inf. Th., 29 (1983) 35\u201341.","journal-title":"IEEE Trans. on Inf. Th."},{"key":"6_CR7","first-page":"255","volume-title":"Cryptography and Coding III","author":"K.M. Martin","year":"1993","unstructured":"K.M. Martin. Untrustworthy participants in perfect secret sharing schemes. In Cryptography and Coding III, (M.J. Ganley, Ed.) Clarendon Press, Oxford (1993) 255\u2013264."},{"key":"6_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-48970-3_15","volume-title":"Information Security and Privacy-ACISP\u201999","author":"K.M. Martin","year":"1999","unstructured":"K.M. Martin, J. Pieprzyk, R. Safavi-Naini and H. Wang. Changing thresholds in the absence of secure channels. In Information Security and Privacy-ACISP\u201999, LNCS 1587, Springer, Berlin (1999) 177\u2013191."},{"issue":"8","key":"6_CR9","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1093\/comjnl\/42.8.638","volume":"42","author":"K.M. Martin","year":"1999","unstructured":"K.M. Martin, R. Safavi-Naini and H. Wang. Bounds and techniques for efficient redistribution of secret shares to new access structures. The Computer Journal, 42, No. 8 (1999) 638\u2013649.","journal-title":"The Computer Journal"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22 (1979) 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon. Communication theory of secrecy systems. Bell System Tech. Journal, 28 (1949) 656\u2013715.","journal-title":"Bell System Tech. Journal"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"G. J. Simmons. An introduction to shared secret and\/or shared control schemes and their application. In Contemporary Cryptology, 441\u2013497. IEEE Press, (1991).","DOI":"10.1007\/3-540-38424-3_16"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D.R. Stinson","year":"1992","unstructured":"D.R. Stinson. An explication of secret sharing schemes. Des. Codes Cryptogr., 2 (1992) 357\u2013390.","journal-title":"Des. Codes Cryptogr."},{"key":"6_CR14","unstructured":"Y. Tamura, M. Tada and E. Okamoto. Update of access structure in Shamir\u2019s (k, n)-threshold scheme. Proceedings of The 1999 Symposium on Cryptography and Information Security, Kobe, Japan, January 26\u201329, (1999)."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T13:32:02Z","timestamp":1737034322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}