{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:04:00Z","timestamp":1750237440714},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_11","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"126-135","source":"Crossref","is-referenced-by-count":29,"title":["Multisecret Threshold Schemes"],"prefix":"10.1007","author":[{"given":"Wen-Ai","family":"Jackson","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Christine M.","family":"O\u2019Keefe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"J. Benaloh and J. Leichter: Generalized Secret Sharing and Monotone Functions. Advances in Cryptology \u2014 Crypto\u2019 88, Lecture Notes in Comput. Sci. 403 (1990) 27\u201335"},{"key":"11_CR2","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley: Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference 48 (1979) 313\u2013317","journal-title":"Proceedings of AFIPS 1979 National Computer Conference"},{"key":"11_CR3","unstructured":"G. R. Blakley and C. Meadows: Security of Ramp Schemes. Advances in Cryptology \u2014 Crypto\u2019 84, Lecture Notes in Comput. Sci. 196 (1985) 411\u2013431"},{"key":"11_CR4","unstructured":"R. Blom: An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology-Eurocrypt\u201984, Lecture Notes in Comput. Sci. 209 (1984) 335\u2013338"},{"key":"11_CR5","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Presented at Crypto\u201992"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis and U. Vaccaro: Efficient Sharing of Many Secrets. Proceedings of STACS\u2019 93, Lec. Notes in Comput. Sci. 665 (1993) 692\u2013703","DOI":"10.1007\/3-540-56503-5_68"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00196772","volume":"2","author":"E. F. Brickell","year":"1991","unstructured":"E. F. Brickell and D. M. Davenport: On the Classification of Ideal Secret Sharing Schemes. J. Cryptology 2 (1991) 123\u2013124","journal-title":"J. Cryptology"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BF02451112","volume":"2","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and D. R. Stinson: Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. J. Cryptology 2 (1992) 153\u2013166","journal-title":"J. Cryptology"},{"key":"11_CR9","unstructured":"M. Ito, A. Saito and T. Nishizeki: Secret Sharing Scheme Realizing General Access Structure. Proceedings IEEE Global Telecom. Conf., Globecom\u2019 87, IEEE Comm. Soc. Press (1987) 99\u2013102"},{"key":"11_CR10","unstructured":"W.-A. Jackson and K. M. Martin: On Ideal Secret Sharing Schemes. Preprint"},{"key":"11_CR11","unstructured":"W.-A. Jackson, K. M. Martin and C. M. O\u2019Keefe: A construction for multisecret threshold schemes. Preprint"},{"key":"11_CR12","unstructured":"K. M. Martin: New Secret Sharing Schemes from Old. To appear in J. Combin. Math. Combin. Comput."},{"key":"11_CR13","unstructured":"T. Matsumoto and H. Imai: On the KEY PREDISTRIBUTION SYSTEM: a Practical Solution to the Key Predistribution Problem. Advances in Cryptology: Crypto\u2019 87, Lecture Notes in Comput. Sci. 293 (1987) 185\u2013193"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R. J. McEliece","year":"1981","unstructured":"R. J. McEliece and D. V. Sarwate: On Sharing Secrets and Reed Solomon Codes. Comm. ACM 24 (1981) 583\u2013584","journal-title":"Comm. ACM"},{"issue":"11","key":"11_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: How to Share a Secret. Comm. ACM Vol 22 11 (1979) 612\u2013613","journal-title":"Comm. ACM"},{"key":"11_CR16","unstructured":"G. J. Simmons: An Introduction to Shared Secret and\/or Shared Control Schemes and their Application. Contemporary Cryptology: The Science of Information Integrity, IEEE Press (1992)"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson: An Explication of Secret Sharing Schemes. Des. Codes Cryptogr. 2 (1992) 357\u2013390","journal-title":"Des. Codes Cryptogr."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:30Z","timestamp":1605647730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_11","relation":{},"subject":[]}}