{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:43:15Z","timestamp":1773150195447,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540565031","type":"print"},{"value":"9783540475743","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-56503-5_68","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:17:28Z","timestamp":1330255048000},"page":"692-703","source":"Crossref","is-referenced-by-count":42,"title":["Efficient sharing of many secrets"],"prefix":"10.1007","author":[{"given":"Carlo","family":"Blundo","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"Santis","sequence":"additional","affiliation":[]},{"given":"Ugo","family":"Vaccaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,27]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume":"403","author":"J. Benaloh","year":"1990","unstructured":"J. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, Lecture Notes in Computer Science, 403:27\u201335, 1990.","journal-title":"Lecture Notes in Computer Science"},{"key":"68_CR2","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley, Safeguarding Cryptographic Keys, AFIPS Conference Proceedings, 48:313\u2013317, 1979.","journal-title":"AFIPS Conference Proceedings"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, in \u201cAdvances in Cryptology \u2014 EUROCRYPT 92\u201d, Ed. R. Rueppel, \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, (to appear).","DOI":"10.1007\/3-540-47555-9_1"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, in \u201cAdvances in Cryptology \u2014 CRYPTO 92\u201d, Ed. E. Brickell, \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, (to appear).","DOI":"10.1007\/3-540-48071-4_11"},{"key":"68_CR5","unstructured":"E. F. Brickell and D. R. Stinson, Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, in \u201cAdvances in Cryptology \u2014 CRYPTO 90\u201d, \u201cLecture Notes in Computer Science\u201d, Springer-Verlag. To appear in J. Cryptology."},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the Size of Shares for Secret Sharing Schemes, in \u201cAdvances in Cryptology \u2014 CRYPTO 91\u201d, Ed. J. Feigenbaum, vol. 576 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 101\u2013113. To appear in J. Cryptology.","DOI":"10.1007\/3-540-46766-1_7"},{"key":"68_CR7","unstructured":"I. Csisz\u00e1r and J. K\u00f6rner, Information Theory. Coding theorems for discrete memoryless systems, Academic Press, 1981."},{"key":"68_CR8","volume-title":"Information Theory and Reliable Communications","author":"R. G. Gallager","year":"1968","unstructured":"R. G. Gallager, Information Theory and Reliable Communications, John Wiley & Sons, New York, NY, 1968."},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"M. Franklin and M. Yung, Communication Complexity of Secure Computation, STOC 1992, pp. 699\u2013710.","DOI":"10.1145\/129712.129780"},{"issue":"no.1","key":"68_CR10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"IT-29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, IEEE Trans. on Inform. Theory, vol. IT-29, no. 1, Jan. 1983, pp. 35\u201341.","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"S. C. Kothari, Generalized Linear Threshold Schemes, in \u201cAdvances in Cryptology \u2014 CRYPTO 84\u201d, G. R. Blakley and D. Chaum Eds., vol. 196 of \u201cLecture Notes in Computer Science\u201d, Springer-Verlag, pp. 231\u2013241.","DOI":"10.1007\/3-540-39568-7_19"},{"issue":"n.9","key":"68_CR12","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R. J. McEliece","year":"1981","unstructured":"R. J. McEliece and D. Sarwate, On Sharing Secrets and Reed-Solomon Codes, Communications of the ACM, vol. 24, n. 9, pp. 583\u2013584, September 1981.","journal-title":"Communications of the ACM"},{"key":"68_CR13","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to Share a Secret, Commun. of the ACM, 22:612\u2013613, 1979.","journal-title":"Commun. of the ACM"},{"key":"68_CR14","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, An Introduction to Shared Secret and\/or Shared Control Schemes and Their Application, Contemporary Cryptology, IEEE Press, pp. 441\u2013497, 1991.","DOI":"10.1007\/3-540-38424-3_16"},{"key":"68_CR15","unstructured":"D. R. Stinson, An Explication of Secret Sharing Schemes, Technical Report UNL-CSE-92-004, Department of Computer Science and Engineering, University of Nebraska, February 1992. To appear in Codes, Design and Cryptography."}],"container-title":["Lecture Notes in Computer Science","STACS 93"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-56503-5_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T21:49:37Z","timestamp":1742593777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-56503-5_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783540565031","9783540475743"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-56503-5_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993]]}}}