{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T09:37:42Z","timestamp":1771234662729,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540576006","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_11","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T22:16:46Z","timestamp":1185920206000},"page":"126-141","source":"Crossref","is-referenced-by-count":43,"title":["Nonperfect Secret Sharing Schemes and Matroids"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Koji","family":"Okada","sequence":"additional","affiliation":[]},{"given":"Keiichi","family":"Sakano","sequence":"additional","affiliation":[]},{"given":"Wakaha","family":"Ogata","sequence":"additional","affiliation":[]},{"given":"Shigeo","family":"Tsujii","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","first-page":"313","volume":"48","author":"G.R. Blakley","year":"1979","unstructured":"G.R. Blakley: Safeguarding cryptographic keys. Proc. of the AFIPS 1979 National Computer Conference, vol.48, pp.313\u2013317 (1979)","journal-title":"Proc. of the AFIPS 1979 National Computer Conference"},{"issue":"11","key":"11_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: How to share a secret. Communications of the ACM, 22,(11), pp.612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"11_CR3","unstructured":"M. Itoh, A. Saito, T. Nishizeki: Secret sharing scheme realizing general access structure. Proc. of IEEE Globecom\u2019 87, Tokyo, pp.99\u2013102 (1987)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"J.C. Benaloh, J. Leichter: Generalized secret sharing and monotone functions. Crypto\u201988, pp.27\u201336 (1990)","DOI":"10.1007\/0-387-34799-2_3"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00196772","volume":"4","author":"E.F. Brickell","year":"1991","unstructured":"E.F. Brickell, D.M. Davenport: On the classification of ideal secret sharing schemes. Journal of Cryptology, vol.4, No.2, pp.123\u2013134 (1991)","journal-title":"Journal of Cryptology"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"R.M. Capocelli, A. De Santis, L. Gargano, U. Vaccaro: On the size of shares for secret sharing schemes. Crypto\u201991, pp.101\u2013113 (1991)","DOI":"10.1007\/3-540-46766-1_7"},{"key":"11_CR7","first-page":"35","volume":"1","author":"E.D. Karnin","year":"1982","unstructured":"E.D. Karnin, J.W. Green, M.E. Hellman: On secret sharing systems. IEEE Trans. IT-29, No.1, pp.35\u201341 (1982)","journal-title":"IEEE Trans. IT-29"},{"key":"11_CR8","first-page":"242","volume":"90","author":"E.F. Brickell","year":"1990","unstructured":"E.F. Brickell, D.R. Stinson: Some improved bounds on the information rate of perfect secret sharing schemes. Crypto\u201990, pp.242\u2013252 (1990)","journal-title":"Crypto\u2019"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"C. Blund, A. De Santis, D.R. Stinson, U. Vaccaro: Graph decomposition and secret sharing schemes. Eurocrypt\u201992, pp.1\u201320 (1992)","DOI":"10.1007\/3-540-47555-9_1"},{"key":"11_CR10","first-page":"21","volume":"92","author":"Y. Frankel","year":"1992","unstructured":"Y. Frankel, Y. Desmedt: Classification of ideal homomorphic threshold schemes over finite Abelian groups. Eurocrypt\u201992, pp.21\u201329 (1992)","journal-title":"Eurocrypt\u2019"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"C. Blund, A. De Santis, L. Gargano, U. Vaccaro: On the information rate of secret sharing schemes. Crypto\u201992 (1992)","DOI":"10.1007\/3-540-48071-4_11"},{"key":"11_CR12","unstructured":"D.R. Stinson: New general bounds on the information rate of secret sharing schemes. Crypto\u201992 (1992)"},{"key":"11_CR13","unstructured":"A. Beimel, B. Chor: Universally ideal secret sharing schemes. Crypt\u201992 (1992)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"W.A. Jackson, K.M. Martin: Cumulative arrays and geometric secret sharing schemes. Auscrypt\u201992 (1992)","DOI":"10.1007\/3-540-57220-1_51"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"M. Bertilsson, I. Ingemarsson: A construction of practical secret sharing schemes using linear block codes. Auscrypt\u201992 (1992)","DOI":"10.1007\/3-540-57220-1_53"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"G.R. Blakley, C. Meadows: Security of ramp schemes. Crypto\u201984, pp.242\u2013268 (1984)","DOI":"10.1007\/3-540-39568-7_20"},{"key":"11_CR17","unstructured":"D.J.A. Welsh: Matroid theory. Academic Press (1976)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"W. Ogata, K. Kurosawa, S. Tsujii: Nonperfect secret sharing schemes. Auscrypt\u201992 (1992)","DOI":"10.1007\/3-540-57220-1_52"},{"key":"11_CR19","volume-title":"Information Theory and Reliable Communications","author":"R.G. Gallager","year":"1968","unstructured":"R.G. Gallager: Information Theory and Reliable Communications. John Wiley & Sons, New York, NY, (1968)"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0019-9958(78)91063-X","volume":"39","author":"S. Fujishige","year":"1978","unstructured":"S. Fujishige: Polymatroidal dependence structure of a set of random variables. Information and Control 39, pp. 55\u201372, (1978)","journal-title":"Information and Control"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:50:19Z","timestamp":1619556619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_11","relation":{},"subject":[]}}