{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:49:12Z","timestamp":1766065752245},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_50","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T18:02:07Z","timestamp":1186423327000},"page":"535-541","source":"Crossref","is-referenced-by-count":146,"title":["How To Broadcast A Secret"],"prefix":"10.1007","author":[{"given":"Shimshon","family":"Berkovits","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"Blakley, G. R., \u201cSafegaurding Cryptographic Keys,\u201d Proceedings of the, AFIPS 1979 National Computer Conference, Vol. 48, June 1979, pp. 313\u2013317.","journal-title":"Proceedings of the, AFIPS 1979 National Computer Conference"},{"key":"50_CR2","first-page":"105","volume":"6","author":"E. F. Brickell","year":"1989","unstructured":"Brickell, E. F., \u201cSome Ideal Secret Sharing Schemes,\u201d Third Carbondale Combinatorics Conference, Carbondale, IL, J. Combinatorial Mathematics and Combinatorial Computing, Vol. 6, 1989, pp. 105\u2013113.","journal-title":"J. Combinatorial Mathematics and Combinatorial Computing"},{"issue":"8","key":"50_CR3","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/32.31350","volume":"SE-15","author":"G. C. Chiou","year":"1989","unstructured":"Chiou, G. C. and W. C. Chen, \u201cSecure Broadcasting Using the Secure Lock,\u201d IEEE Transactions on Software Engineering, Vol. SE-15, No. 8, Aug. 1989, pp. 929\u2013934.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"11","key":"50_CR4","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A., \u201cHow to Share a Secret,\u201d Communications of the ACM, Vol. 22, No. 11, November 1979, pp. 612\u2013613.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:11:37Z","timestamp":1605647497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_50","relation":{},"subject":[]}}