{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:01:34Z","timestamp":1761292894647,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540606932"},{"type":"electronic","value":"9783540492801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60693-9_22","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:54:03Z","timestamp":1330289643000},"page":"190-198","source":"Crossref","is-referenced-by-count":36,"title":["On-line secret sharing"],"prefix":"10.1007","author":[{"given":"Christian","family":"Cachin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"J. Benaloh, and J. Leichter, Generalized secret sharing and monotone functions, in Advances in Cryptology \u2014 CRYPTO '88, S. Goldwasser, ed., vol. 403 of Lecture Notes in Computer Science, Springer-Verlag, 1990, pp. 27\u201335.","DOI":"10.1007\/0-387-34799-2_3"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"B. Blakley, G. R. Blakley, A. H. Chan, and J. L. Massey, Threshold schemes with disenrollment, in Advances in Cryptology \u2014 CRYPTO '92, E. F. Brickell, ed., vol. 740 of Lecture Notes in Computer Science, Springer-Verlag, 1993, pp. 540\u2013548.","DOI":"10.1007\/3-540-48071-4_38"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro, Fully dynamic secret sharing schemes, in Advances in Cryptology \u2014 CRYPTO '93, D. R. Stinson, ed., vol. 773 of Lecture Notes in Computer Science, Springer-Verlag, 1994, pp. 110\u2013125.","DOI":"10.1007\/3-540-48329-2_10"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, G. Di Crescenzo, A. G. Gaggia, and U. Vaccaro, Multi-secret sharing schemes, in Advances in Cryptology \u2014 CRYPTO '94, Y. G. Desmedt, ed., vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, 1994, pp. 150\u2013163.","DOI":"10.1007\/3-540-48658-5_17"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"R. M. Capocelli, A. D. Santis, L. Gargano, and U. Vaccaro, On the size of shares for secret sharing schemes, in Advances in Cryptology \u2014 CRYPTO '91, J. Feigenbaum, ed., vol. 576 of Lecture Notes in Computer Science, Springer-Verlag, 1992, pp. 101\u2013113.","DOI":"10.1007\/3-540-46766-1_7"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"L. Csirmaz, The size of a share must be large, in Advances in Cryptology \u2014 EUROCRYPT '94, A. De Santis, ed., vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, 1995, pp. 13\u201322.","DOI":"10.1007\/BFb0053420"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/35.312844","volume":"32","author":"D. E. Denning","year":"1994","unstructured":"D. E. Denning and M. Smid, Key escrowing today, IEEE Communications Magazine, 32 (1994), pp. 58\u201368.","journal-title":"IEEE Communications Magazine"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game or a completeness theorem for protocols with honest majority, in Proc. 19th ACM Symposium on Theory of Computing (STOC), 1987, pp. 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"22_CR9","unstructured":"M. Ito, A. Saito, and T. Nishizeki, Secret sharing scheme realizing general access structure, in Proceedings of IEEE Globecom '87, 1987, pp. 99\u2013102."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, Secret sharing made short, in Advances in Cryptology \u2014 CRYPTO '93, D. R. Stinson, ed., vol. 773 of Lecture Notes in Computer Science, Springer-Verlag, 1994, pp. 136\u2013146.","DOI":"10.1007\/3-540-48329-2_12"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"L. Lamport, Password authentication with insecure communication, Comm. ACM, 24 (1981).","DOI":"10.1145\/358790.358797"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"S. Micali, Fair public-key cryptosystems, in Advances in Cryptology \u2014 CRYPTO '92, E. F. Brickell, ed., vol. 740 of Lecture Notes in Computer Science, Springer-Verlag, 1993, pp. 113\u2013138.","DOI":"10.1007\/3-540-48071-4_9"},{"key":"22_CR13","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"M. O. Rabin","year":"1989","unstructured":"M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. Assoc. Comput. Mach., 36 (1989), pp. 335\u2013348.","journal-title":"J. Assoc. Comput. Mach."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612\u2013613.","journal-title":"Comm. ACM"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, An introduction to shared secret and\/or shared control schemes and their application, in Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, 1991, pp. 441\u2013497.","DOI":"10.1007\/3-540-38424-3_16"},{"key":"22_CR16","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, 2 (1992), pp. 357\u2013390.","journal-title":"Designs, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60693-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T23:08:16Z","timestamp":1742598496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60693-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540606932","9783540492801"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-60693-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}