{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T02:34:45Z","timestamp":1770431685406,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540577669","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_12","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"136-146","source":"Crossref","is-referenced-by-count":148,"title":["Secret Sharing Made Short"],"prefix":"10.1007","author":[{"given":"Hugo","family":"Krawczyk","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Benaloh, J. and Leichter J., \u201cGeneralized secret sharing and monotone functions\u201d, Proc. Crypto\u2019 88, pp. 27\u201335.","DOI":"10.1007\/0-387-34799-2_3"},{"key":"12_CR2","first-page":"313","volume":"48","author":"G.R. Blakley","year":"1979","unstructured":"Blakley, G.R., \u201cSafeguarding Cryptographic Keys\u201d, Proc. AFIPS 1979 National Computer Conference, New York, Vol. 48, 1979, pp. 313\u2013317.","journal-title":"Proc. AFIPS 1979 National Computer Conference"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Blakley, G.R., and Meadows C. \u201cSecurity of Ramp Schemes\u201d, in Lecture Notes in Computer Science 196; Advances in Cryptology: Proc. Crypto\u2019 84, Springer-Verlag, 1985, pp.242\u2013268.","DOI":"10.1007\/3-540-39568-7_20"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Brickel, E.F., and Stinson, D.R., \u201cThe Detection of Cheaters in Threshold Schemes\u201d, in Lecture Notes in Computer Science 403; Advances in Cryptology: Proc. Crypto\u2019 88, Springer-Verlag, 1990, pp.564\u2013577.","DOI":"10.1007\/0-387-34799-2_40"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chor, B., S. Goldwasser, S. Micali, and B. Awerbuch, \u201cVerifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults\u201d, Proc. 26th FOCS, 1985, pp. 383\u2013395.","DOI":"10.1109\/SFCS.1985.64"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Waarts, O., and Yung, M., \u201cPerfectly Secure Message Transmission\u201d, Proc. 31st IEEE Symp. on Foundations of Computer Science, 1990, pp. 36\u201345.","DOI":"10.1109\/FSCS.1990.89522"},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF02620230","volume":"6","author":"O. Goldreich","year":"1993","unstructured":"Goldreich, O., \u201cA Uniform-Complexity Treatment of Encryption and Zero-Knowlege\u201d, Jour. of Cryptology, Vol. 6, No. 1, 1993, pp.21\u201353.","journal-title":"Jour. of Cryptology"},{"issue":"2","key":"12_CR8","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., and S. Micali, \u201cProbabilistic Encryption\u201d, JCSS, Vol. 28, No. 2, 1984, pp. 270\u2013299.","journal-title":"JCSS"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., \u201cDistributed Fingerprints and Secure Information Dispersal\u201d, Proc. of 12th. PODC, pp. 207\u2013218, 1993.","DOI":"10.1145\/164051.164075"},{"issue":"9","key":"12_CR10","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R.J. McElice","year":"1978","unstructured":"McElice R.J., and Sarwate, D.V., \u201cOn Sharing Secrets and Reed-Solomon Codes\u201d, Comm. ACM, Vol. 24, No. 9, 1978, pp. 583\u2013584.","journal-title":"Comm. ACM"},{"key":"12_CR11","unstructured":"Micali, S., \u201cFair Public-Key Cryptosystems\u201d, Crypto\u2019 92."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Naor, M., and Roth, R.M., \u201cOptimal File Sharing in Distributed Networks\u201d, Proc. 32nd IEEE Symp. on Foundations of Computer Science, 1991, pp. 515\u2013525.","DOI":"10.1109\/SFCS.1991.185414"},{"issue":"5","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/18.42233","volume":"IT-35","author":"F.P. Preparata","year":"1989","unstructured":"Preparata, F.P., \u201cHolographic Dispersal and Recovery of Information\u201d, IEEE Trans. on Information Theory, IT-35, No. 5, 1989, pp. 1123\u20131124.","journal-title":"IEEE Trans. on Information Theory"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Rabin, M.O., \u201cRandomized Byzantine Agreement\u201d, 24th FOCS, pp. 403\u2013409, 1983.","DOI":"10.1109\/SFCS.1983.48"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M.O. Rabin","year":"1989","unstructured":"Rabin, M.O., \u201cEfficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance\u201d, Jour. of ACM, Vol. 36, No. 2, 1989, pp. 335\u2013348.","journal-title":"Jour. of ACM"},{"issue":"11","key":"12_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A., \u201cHow to Share a Secret\u201d, Comm. ACM, Vol. 22, No. 11, 1979, pp. 612\u2013613.","journal-title":"Comm. ACM"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02252871","volume":"1","author":"M. Tompa","year":"1988","unstructured":"Tompa, M. and H. Woll, \u201cHow to share a secret with cheaters\u201d, Journal of Cryptology, Vol 1, 1988, pp 133\u2013138.","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:30Z","timestamp":1605647730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_12","relation":{},"subject":[]}}