{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:43Z","timestamp":1725488323822},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_40","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"558-565","source":"Crossref","is-referenced-by-count":1,"title":["An l-Span Generalized Secret Sharing Scheme"],"prefix":"10.1007","author":[{"given":"Lein","family":"Harn","sequence":"first","affiliation":[]},{"given":"Hung-Yu","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, \u201cHow to Share a Secret\u201d, Communication ACM 22, 11, Nov. 1979, 612\u2013613.","journal-title":"Communication ACM"},{"key":"40_CR2","unstructured":"M. Ito, A. Saito, and T. Nishizeki, \u201cSecret Sharing Scheme Realizing General Access Structure\u201d, Proc. Glob. Com (1987)."},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"J. Benaloh, and J. Leichter, \u201cGeneralized Secret Sharing and Monotone Functions\u201d, Proc. Crypto\u2019 88, Springer-Verlag, 27\u201335.","DOI":"10.1007\/0-387-34799-2_3"},{"key":"40_CR4","unstructured":"H. Y. Lin and L. Harn, \u201cA Generalized Secret Sharing Scheme with Cheater Detection\u201d, Proc. Asiacrypt\u2019 91, Nov. 1991, Japan."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"C. S. Laih, L. Harn, J. Y. Lee and T. Hwang, \u201cDynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space\u201d, Proc. Crypto\u2019 89, Springer-Verlag, 286\u2013297.","DOI":"10.1007\/0-387-34805-0_26"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:21Z","timestamp":1605647721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_40","relation":{},"subject":[]}}