{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:20:56Z","timestamp":1768681256334,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440505","type":"print"},{"value":"9783540457084","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45708-9_4","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T08:48:16Z","timestamp":1192783696000},"page":"47-60","source":"Crossref","is-referenced-by-count":213,"title":["The LSD Broadcast Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Dani","family":"Halevy","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","first-page":"536","volume-title":"Advances in Cryptology \u2014 Eurocrypt\u201991","author":"S. Berkovits","year":"1991","unstructured":"S. Berkovits, How to Broadcast a secret, Advances in Cryptology \u2014 Eurocrypt\u201991,Lecture Notes in Computer Science 547, Springer, 1991, pp.536\u2013541."},{"key":"4_CR2","unstructured":"Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas, Multicast Security: A Taxonomy and Some Efficient Constructions."},{"key":"4_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/3-540-48405-1_24","volume-title":"Efficient methods for integrating traceability and broadcast encryption","author":"E. Gafni","year":"1999","unstructured":"E. Gafni, J. Staddon and Y.L. Yin, Efficient methods for integrating traceability and broadcast encryption,Proc. Advances in Cryptology \u2014 Crypto\u2019 99, LNCS 1666, Springer, 1999, 372\u2013387."},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-44598-6_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u20192000","author":"J.A. Garay","year":"2000","unstructured":"J.A. Garay, J. Staddon and A. Wool, Long-Lived Broadcast Encryption. Advances in Cryptology \u2014 CRYPTO\u20192000, Lecture Notes in Computer Science, vol 1880, pp. 333\u2013352, 2000."},{"key":"4_CR5","series-title":"Lect Notes Comput Sci","first-page":"480","volume-title":"Advances in Cryptology \u2014 Crypto 93\u2019","author":"M. Naor","year":"1994","unstructured":"M. Naor, A. Fiat, Broadcast Encryption, Advances in Cryptology \u2014 Crypto 93\u2019,Lecture Notes in Computer Science 773, Springer, 1994, pp. 480\u2013491."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"D. Naor., M. Naor, J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers. February, 2001.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"4_CR7","unstructured":"M. Naor, B. Pinkas, Threshold Traitor Tracing, Crypto 98."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"M. Naor, B. Pinkas, Efficient Trace and Revoke Schemes, FC\u20192000.","DOI":"10.1007\/3-540-45472-1_1"},{"issue":"11","key":"4_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. \u201c. Shamir","year":"1979","unstructured":"Shamir, A., \u201cHow to Share a Secret\u201d, Communications of the ACM, vol. 22, NO. 11, November 1979, pp. 612\u2013613.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45708-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T21:27:41Z","timestamp":1556918861000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45708-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440505","9783540457084"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-45708-9_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}