{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:12:32Z","timestamp":1753884752013},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540535874"},{"type":"electronic","value":"9783540468776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-46877-3_32","type":"book-chapter","created":{"date-parts":[[2007,9,3]],"date-time":"2007-09-03T01:34:21Z","timestamp":1188783261000},"page":"352-360","source":"Crossref","is-referenced-by-count":12,"title":["Cryptosystem for Group Oriented Cryptography"],"prefix":"10.1007","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"32_CR1","volume-title":"Cryptography and Data Security","author":"D. E. R. Denning","year":"1982","unstructured":"D. E. R. Denning. Cryptography and Data Security. Addison \u2014 Wesley, Reading, Mass., 1982."},{"issue":"6","key":"32_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. \u201cNew directions in cryptography\u201d. IEEE Trans. Inform. Theory, IT-22(6):644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"32_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology, proc. of Crypto\u201987","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt. \u201cSociety and group oriented cryptography: a new concept\u201d. In C. Pomerance, editor, Advances in Cryptology, proc. of Crypto\u201987 (Lecture Notes in Computer Science 293), pages 120\u2013127. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16\u201320."},{"key":"32_CR4","unstructured":"Y. Desmedt and Y. Frankel, \u201cThreshold Cryptosystems\u201d. presented at Crypto\u201989. Santa Barbara, California, U.S.A. Aug. 20\u201324."},{"key":"32_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Presented at Eurocrypt\u201989","author":"Y. Frankel","year":"1989","unstructured":"Y. Frankel. \u201cPractical Protocol for Large Group Oriented Networks\u201d. Presented at Eurocrypt\u201989, Houthalen, Belgium, to appear in Advances in Cryptology. Proc. of Eurocrypt\u201989 (Lecture Notes in Computer Science), Springer-Verlag, April 1989."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson. \u201cHow to play any mental game\u201d. In Proceedings of the Nineteenth ACM symp. Theory of Computing, STOC, pages 218\u2013239, May 25\u201327, 1987.","DOI":"10.1145\/28395.28420"},{"key":"32_CR7","unstructured":"T. Hwang, \u201cOn the Secure Communications of Group Oriented Socienties\u201d, 1990 IEEE International Symposium on Info. Theory."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"C. S. Laih, L. Harn, and J. Y. Lee, \u201cA new threshold scheme and its application on designing the conference key distribution cryptosystem.\u201d, Info. processing letters, North-Holland Vol. 32, No. 3, 24 Aug. 1989.","DOI":"10.1016\/0020-0190(89)90008-2"},{"issue":"8","key":"32_CR9","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1145\/361082.361089","volume":"17","author":"G. p. Purdy","year":"1974","unstructured":"G. p. Purdy, \u201cA High Security Log-in Procedure\u201d, Commun. ACM vol. 17(8), pp. 442\u2013445 Aug. 1974.","journal-title":"Commun. ACM"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Commun. ACM, 22:612\u2013613, November 1979.","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201990"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46877-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:43:58Z","timestamp":1556826238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46877-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540535874","9783540468776"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-46877-3_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1991]]}}}