{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:05:32Z","timestamp":1773921932903,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"},{"value":"9783540486589","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-48658-5_17","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"150-163","source":"Crossref","is-referenced-by-count":49,"title":["Multi-Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Di Crescenzo","sequence":"additional","affiliation":[]},{"given":"Antonio Giorgio","family":"Gaggia","sequence":"additional","affiliation":[]},{"given":"Ugo","family":"Vaccaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 88","author":"J. C. Benaloh","year":"1990","unstructured":"J. C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, in \u201cAdvances in Cryptology \u2014 CRYPTO\u2019 88\u201d, S. Goldwasser Ed., \u201cLecture Notes in Computer Science\u201d, Vol. 403, Springer-Verlag, Berlin, pp. 27\u201335, 1990."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proceedings of 20th Annual ACM Symposium on Theory of Computing, pp. 1\u201310, 1988.","DOI":"10.1145\/62212.62213"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings AFIPS 1979 National Computer Conference, pp. 313\u2013317, June 1979.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"17_CR4","series-title":"Lect Notes Comput Sci","first-page":"149","volume-title":"Advances in Cryptology-CRYPTO\u2019 92","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, in \u201cAdvances in Cryptology-CRYPTO\u2019 92\u201d, E. Brickell Ed., \u201cLecture Notes in Computer Science\u201d, Vol. 740, Springer-Verlag, Berlin, pp. 149\u2013169, 1993. To appear in Theoretical Computer Science."},{"key":"17_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1007\/3-540-56503-5_68","volume-title":"Proceedings of STACS\u2019 93 (10th Symp. on Theoretical Aspects of Computer Science)","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A De Santis, and U. Vaccaro, Efficient Sharing of Many Secrets, in \u201cProceedings of STACS\u2019 93 (10th Symp. on Theoretical Aspects of Computer Science)\u201d, P. Enjalbert, A. Finkel, K. W. Wagner Eds., \u201cLecture Notes in Computer Science\u201d, Vol. 665, Springer-Verlag, Berlin, pp. 692\u2013703, 1993."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/BF00198463","volume":"6","author":"R. M. Capocelli","year":"1993","unstructured":"R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the Size of Shares for Secret Sharing Schemes, Journal of Cryptology, Vol. 6, pp. 57\u2013167, 1993.","journal-title":"Journal of Cryptology"},{"key":"17_CR7","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, Information Theory. Coding Theorems for Discrete Memoryless Systems, Academic Press, 1981."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Yung, Communication Complexity of Secure Computation, Proceedings of 24th Annual ACM Symposium on Theory of Computing\u201d, pp. 699\u2013710, 1992.","DOI":"10.1145\/129712.129780"},{"key":"17_CR9","volume-title":"Information Theory and Reliable Communications","author":"R. G. Gallager","year":"1968","unstructured":"R. G. Gallager, Information Theory and Reliable Communications, John Wiley & Sons, New York, NY, 1968."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, How to Play any Mental Game, Proceedings of 19th ACM Symposium on Theory of Computing, pp. 218\u2013229, 1987.","DOI":"10.1145\/28395.28420"},{"key":"17_CR11","unstructured":"M. Ito, A. Saito, and T. Nishizeki, Secret Sharing Scheme Realizing General Access Structure, Proceedings of IEEE Global Telecommunications Conference, Globecom 87, Tokyo, Japan, pp. 99\u2013102, 1987."},{"key":"17_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-48329-2_11","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"W.-A. Jackson","year":"1994","unstructured":"W.-A. Jackson, K. M. Martin, and C. M. O\u2019Keefe, Multisecret Threshold Schemes, in \u201cAdvances in Cryptology-CRYPTO\u2019 93\u201d, D.R. Stinson Ed., \u201cLecture Notes in Computer Science\u201d, Vol. 773, Springer-Verlag, Berlin, pp. 126\u2013135, 1994."},{"key":"17_CR13","unstructured":"W.-A. Jackson, K. M. Martin, and C. M. O\u2019Keefe, A Construction for Multisecret Threshold Schemes, Preprint, 1994."},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"IT-29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, IEEE Trans. on Inform. Theory, Vol. IT-29, no. 1, pp. 35\u201341, Jan. 1983.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"17_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/3-540-39568-7_19","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 84","author":"S. C. Kothari","year":"1985","unstructured":"S. C. Kothari, Generalized Linear Threshold Schemes, in \u201cAdvances in Cryptology \u2014 CRYPTO\u2019 84\u201d, G. R. Blakley, D. Chaum Eds., \u201cLecture Notes in Computer Science\u201d, Vol. 196, Springer-Verlag, Berlin, pp. 231\u2013241, 1985."},{"issue":"11","key":"17_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to Share a Secret, Communications of the ACM, Vol. 22, n. 11, pp. 612\u2013613, Nov. 1979.","journal-title":"Communications of the ACM"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, An Introduction to Shared Secret and\/or Shared Control Schemes and Their Application, Contemporary Cryptology, IEEE Press, pp. 441\u2013497, 1991.","DOI":"10.1007\/3-540-38424-3_16"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson, An Explication of Secret Sharing Schemes, Design, Codes and Cryptography, Vol. 2, pp. 357\u2013390, 1992.","journal-title":"Design, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:03:13Z","timestamp":1737356593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540583332","9783540486589"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1994]]}}}