{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T02:42:51Z","timestamp":1770432171249,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540573401","type":"print"},{"value":"9783540480716","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-48071-4_33","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:23:49Z","timestamp":1186349029000},"page":"471-486","source":"Crossref","is-referenced-by-count":412,"title":["Perfectly-Secure Key Distribution for Dynamic Conferences"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]},{"given":"Shay","family":"Kutten","sequence":"additional","affiliation":[]},{"given":"Ugo","family":"Vaccaro","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,18]]},"reference":[{"key":"33_CR1","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology: Proceedings of Crypto 91","author":"R. Bird","year":"1991","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Jansen, S. Kutten, R. Molva and M. Yung Systematic Design of Two-Party Authentication, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991."},{"key":"33_CR2","series-title":"Lect Notes Comput Sci","first-page":"335","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 84","author":"R. Blom","year":"1984","unstructured":"R. Blom, An Optimal Class of Symmetric Key Generation Systems, Advances in Cryptology: Proceedings of Eurocrypt 84, Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 1984, pp. 335\u2013338."},{"key":"33_CR3","series-title":"Lect Notes Comput Sci","first-page":"418","volume-title":"Advances in Cryptology: Proceedings of Crypto 87","author":"E. Brickell","year":"1987","unstructured":"E. Brickell, P.J. Lee and Y. Yacobi, Secure Audio Conferencing, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 418\u2013426."},{"key":"33_CR4","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, Information Theory. Coding theorems for discrete memoryless systems, Academic Press, 1981."},{"issue":"6","key":"33_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman, New Direction in Cryptography, IEEE Transaction on Information Theory, vol. 22, no. 6, December 1976, pp. 644\u2013654.","journal-title":"IEEE Transaction on Information Theory"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"M.J. Fischer, M.S. Paterson and C. Rackoff, Secure Bit Transmission Using a Random Deal of Cards, in Distributed Computing and Cryptography, AMS, 1991, pp. 173\u2013181.","DOI":"10.1090\/dimacs\/002\/11"},{"key":"33_CR7","series-title":"Lect Notes Comput Sci","first-page":"141","volume-title":"Advances in Cryptology: Proceedings of Crypto 91","author":"M.J. Fischer","year":"1991","unstructured":"M.J. Fischer and R.N. Wright, Multiparty Secret Key Exchange Using a Random Deal of Cards, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991, pp. 141\u2013155."},{"key":"33_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/3-540-38424-3_20","volume-title":"Advances in Cryptology: Proceedings of Crypto 90","author":"W. Fumy","year":"1990","unstructured":"W. Fumy and M. Munzert, A Modular Approach to Key Distribution, Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science, vol. 537, Springer-Verlag, Berlin, 1990, pp. 274\u2013283."},{"key":"33_CR9","volume-title":"Information Theory and Reliable Communications","author":"R. G. Gallager","year":"1968","unstructured":"R. G. Gallager, Information Theory and Reliable Communications, John Wiley & Sons, New York, NY, 1968."},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L. Gong","year":"1990","unstructured":"L. Gong and D.J. Wheeler, A Matrix Key-Distribution Scheme, Journal of Cryptology, vol. 2, 1990, pp. 51\u201359.","journal-title":"Journal of Cryptology"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and S. Rudich, Limits on the Provable Consequences of One-Way Permutations, 21-st STOC proceedings, May 1989, pp. 44\u201361.","DOI":"10.1145\/73007.73012"},{"key":"33_CR12","series-title":"Lect Notes Comput Sci","first-page":"175","volume-title":"Advances in Cryptology: Proceedings of Crypto 87","author":"K. Koyama","year":"1987","unstructured":"K. Koyama and K. Ohta, Identity-based Conference Key Distribution, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 175\u2013184."},{"key":"33_CR13","volume-title":"The Theory of Error Correcting Codes","author":"F.J. MacWilliams","year":"1988","unstructured":"F.J. MacWilliams and N.J.A. Sloane, The Theory of Error Correcting Codes, North-Holland, New York, 1988."},{"key":"33_CR14","series-title":"Lect Notes Comput Sci","first-page":"185","volume-title":"Advances in Cryptology: Proceedings of Crypto 87","author":"T. Matsumoto","year":"1987","unstructured":"T. Matsumoto and H. Imai, On the Key Predistribution System: A Practical Solution to the Key Distribution Problem, Advances in Cryptology: Proceedings of Crypto 87, Lecture Notes in Computer Science, vol. 239, Springer-Verlag, Berlin, 1987, pp. 185\u2013193."},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K.S. McCurley","year":"1988","unstructured":"K.S. McCurley, A Key Distribution System Equivalent to Factoring, Journal of Cryptology, vol. 1, 1988, pp. 95\u2013105.","journal-title":"Journal of Cryptology"},{"key":"33_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1007\/3-540-46416-6_43","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt 91","author":"U. Maurer","year":"1991","unstructured":"U. Maurer and Y. Yacobi, Non-interactive Public-Key Cryptography, Advances in Cryptology: Proceedings of Eurocrypt 91, Lecture Notes in Computer Science, vol. 547, Springer-Verlag, Berlin, 1991, pp. 498\u2013507."},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R. C. Merkle","year":"1978","unstructured":"R. C. Merkle, Secure Communication over Insecure Channels, Communications of the ACM, vol. 21, Apr. 1978, pp. 294\u2013299.","journal-title":"Communications of the ACM"},{"key":"33_CR18","unstructured":"Fiat, Naor; and Alon (personal communication)."},{"key":"33_CR19","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of the ACM, vol. 21, Dec. 1978, pp. 993\u2013999.","journal-title":"Communications of the ACM"},{"issue":"4","key":"33_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/49.17711","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"E. Okamoto and K. Tanaka, Key Distribution System Based on Identification Information, IEEE Journal on Selected Areas in Communications, vol. 7, no. 4, May 1989, pp. 481\u2013485.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"A. Shamir, Identity-based Cryptosystems and Signature Scheme, Proceedings of Crypto 84, pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"33_CR22","series-title":"Lect Notes Comput Sci","first-page":"518","volume-title":"Advances in Cryptology: Proceedings of Crypto 89","author":"D.G. Steer","year":"1990","unstructured":"D.G. Steer, L. Strawczynsji, W. Diffie and M Wiener, A Secure Audio Teleconferencing System, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, vol. 403, Springer-Verlag, Berlin, 1990, pp. 518\u2013528."},{"key":"33_CR23","series-title":"Lect Notes Comput Sci","first-page":"288","volume-title":"Advances in Cryptology: Proceedings of Crypto 91","author":"S. Tsujii","year":"1991","unstructured":"S.. Tsujii and J. Chao, A New ID-based Key Sharing Scheme, Advances in Cryptology: Proceedings of Crypto 91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, Berlin, 1991, pp. 288\u2013299."},{"key":"33_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-38424-3_19","volume-title":"Advances in Cryptology: Proceedings of Crypto 90","author":"Y. Yacobi","year":"1990","unstructured":"Y. Yacobi, A Key Distribution Paradox, Advances in Cryptology: Proceedings of Crypto 90, Lecture Notes in Computer Science, vol. 537, Springer-Verlag, Berlin, 1990, pp. 268\u2013273."},{"key":"33_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/0-387-34805-0_32","volume-title":"Advances in Cryptology: Proceedings of Crypto 89","author":"Y. Yacobi","year":"1990","unstructured":"Y. Yacobi and Z. Shmueley, On Key Distribution Systems, Advances in Cryptology: Proceedings of Crypto 89, Lecture Notes in Computer Science, vol. 435, Springer-Verlag, Berlin, 1990, pp. 344\u2013355."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:31:40Z","timestamp":1556724700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540573401","9783540480716"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1993]]}}}