{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T12:54:54Z","timestamp":1770814494479,"version":"3.50.1"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032163417","type":"print"},{"value":"9783032163424","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16342-4_20","type":"book-chapter","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:21Z","timestamp":1770800301000},"page":"358-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"Prajwal","family":"Thakare","sequence":"first","affiliation":[]},{"given":"Akash Om","family":"Trivedi","sequence":"additional","affiliation":[]},{"given":"Urbi","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","volume-title":"Coding and Cryptology","author":"A Beimel","year":"2011","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., et al. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11\u201346. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20901-7_2"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge (MARK), vol. 1979, pp. 313\u2013318 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"11","key":"20_CR3","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"issue":"2","key":"20_CR4","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208\u2013210 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Mignotte, M.: How to share a secret. In: Beth, T. (ed.) Cryptography, pp. 371\u2013375. Springer, Heidelberg (1983)","DOI":"10.1007\/3-540-39466-4_27"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Rashidi, L., et al.: More than a fair share: network data remanence attacks against secret sharing-based schemes. In: Network and Distributed System Security Symposium, NDSS, vol.\u00a028 (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/more-than-a-fair-share-network-data-remanence-attacks-against-secret-sharing-based-schemes\/","DOI":"10.14722\/ndss.2021.23062"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1109\/TIFS.2023.3243495","volume":"18","author":"H Boyapally","year":"2023","unstructured":"Boyapally, H., Patranabis, S., Mukhopadhyay, D.: Commitments via physically related functions. IEEE Trans. Inf. Forensics Secur. 18, 1497\u20131508 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Jia, X., Wang, D., Nie, D., Luo, X., Sun, J.Z.: A new threshold changeable secret sharing scheme based on the Chinese remainder theorem. Inf. Sci. 473, 13\u201330 (2019). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025518307242","DOI":"10.1016\/j.ins.2018.09.024"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"3847","DOI":"10.1109\/TIFS.2022.3214089","volume":"17","author":"D Chatterjee","year":"2022","unstructured":"Chatterjee, D., Boyapally, H., Patranabis, S., Chatterjee, U., Hazra, A., Mukhopadhyay, D.: Physically related functions: exploiting related inputs of PUFs for authenticated-key exchange. IEEE Trans. Inf. Forensics Secur. 17, 3847\u20133862 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-030-95085-9_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"P Naik","year":"2022","unstructured":"Naik, P., Chatterjee, U.: Network data remanence side channel attack on SPREAD, H-SPREAD and reverse AODV. In: Batina, L., Picek, S., Mondal, M. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 129\u2013147. Springer, Cham (2022)"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16342-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T08:58:24Z","timestamp":1770800304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16342-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032163417","9783032163424"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16342-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"12 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guwahati","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.iitg.ac.in\/space2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}