{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:44:06Z","timestamp":1743083046591,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_32","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T13:07:52Z","timestamp":1450271272000},"page":"532-541","source":"Crossref","is-referenced-by-count":3,"title":["A (k,\u00a0n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values"],"prefix":"10.1007","author":[{"given":"Shyamalendu","family":"Kandar","sequence":"first","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"11","key":"32_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"32_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys: Proc. Natl. Comput. Conf. 48, 313\u2013317 (1979)","journal-title":"Proc. Natl. Comput. Conf."},{"issue":"12","key":"32_CR3","first-page":"2762","volume":"83","author":"H-Y Chien","year":"2000","unstructured":"Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: A practical (t, n) multi-secret sharing scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 83(12), 2762\u20132765 (2000)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 1994","author":"W-A Jackson","year":"1995","unstructured":"Jackson, W.-A., Martin, K.M., O\u2019Keefe, C.M.: On sharing many secrets. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917. Springer, Heidelberg (1995)"},{"issue":"19","key":"32_CR5","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1049\/el:19941076","volume":"30","author":"J He","year":"1994","unstructured":"He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591\u20131592 (1994)","journal-title":"Electron. Lett."},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1049\/el:19950073","volume":"31","author":"J He","year":"1995","unstructured":"He, J., Dawson, E.: Multisecret-sharing scheme based on one-way function. Electron. Lett. 31(2), 93\u201395 (1995)","journal-title":"Electron. Lett."},{"issue":"2","key":"32_CR7","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/S0096-3003(03)00355-2","volume":"151","author":"C-C Yang","year":"2004","unstructured":"Yang, C.-C., Chang, T.-Y., Hwang, M.-S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483\u2013490 (2004)","journal-title":"Appl. Math. Comput."},{"issue":"2","key":"32_CR8","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.amc.2004.06.120","volume":"167","author":"L-J Pang","year":"2005","unstructured":"Pang, L.-J., Wang, Y.-M.: A new (t, n) multi-secret sharing scheme based on shamir\u2019s secret sharing. Appl. Math. Comput. 167(2), 840\u2013848 (2005)","journal-title":"Appl. Math. Comput."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Tan, X., Wang, Z.: A new (t, n) multi-secret sharing scheme. In: ICCEE 2008 Computer and Electrical Engineering, pp. 861\u2013865. IEEE (2008)","DOI":"10.1109\/ICCEE.2008.76"},{"issue":"1","key":"32_CR10","first-page":"37","volume":"3","author":"H-Y Lin","year":"2008","unstructured":"Lin, H.-Y., Yeh, Y.-S.: Dynamic multi-secret sharing scheme. Int. J. Contemp. Math. Sci. 3(1), 37\u201342 (2008)","journal-title":"Int. J. Contemp. Math. Sci."},{"issue":"9","key":"32_CR11","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/j.aml.2010.04.024","volume":"23","author":"A Das","year":"2010","unstructured":"Das, A., Adhikari, A.: An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9), 993\u2013996 (2010)","journal-title":"Appl. Math. Lett."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Bai, L.: A reliable (k, n) image secret sharing scheme. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 31\u201336. IEEE (2006)","DOI":"10.1109\/DASC.2006.11"},{"key":"32_CR13","series-title":"Applied Condition Monitoring","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-319-12877-1_5","volume-title":"Stochastic Modeling of Thermal Fatigue Crack Growth","author":"V Radu","year":"2015","unstructured":"Radu, V.: Application. In: Radu, V. (ed.) Stochastic Modeling of Thermal Fatigue Crack Growth. ACM, vol. 1, pp. 63\u201370. Springer, Heidelberg (2015)"},{"issue":"3","key":"32_CR14","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1007\/s10623-013-9831-6","volume":"73","author":"J Herranz","year":"2014","unstructured":"Herranz, J., Ruiz, A., Sez, G.: New results and applications for multi-secret sharing schemes. Des. Codes Crypt. 73(3), 841\u2013864 (2014)","journal-title":"Des. Codes Crypt."},{"issue":"7","key":"32_CR15","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1016\/j.ins.2010.11.032","volume":"181","author":"C-F Hsu","year":"2011","unstructured":"Hsu, C.-F., Cheng, Q., Tang, X., Zeng, B.: An ideal multi-secret sharing scheme based on MSP. Inf. Sci. 181(7), 1403\u20131409 (2011)","journal-title":"Inf. Sci."},{"issue":"4","key":"32_CR16","first-page":"249","volume":"16","author":"R Subha","year":"2014","unstructured":"Subha, R., Bhagvati, C.: CRT based threshold multi secret sharing scheme. Int. J. Netw. Secur. 16(4), 249\u2013255 (2014)","journal-title":"Int. J. Netw. Secur."},{"issue":"2","key":"32_CR17","first-page":"69","volume":"2","author":"X Dong","year":"2015","unstructured":"Dong, X.: A multi-secret sharing scheme based on the CRT and RSA. Int. J. Netw. Secur. 2(2), 69\u201372 (2015)","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"32_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.24138\/jcomss.v11i1.113","volume":"11","author":"A Endurthi","year":"2015","unstructured":"Endurthi, A., Bidyapati Chanu, O., Naidu Tentu, A., Venkaiah, V.C.: Reusable multi-stage multi-secret sharing schemes based on CRT. J. Commun. Softw. Syst. 11(1), 15\u201324 (2015)","journal-title":"J. Commun. Softw. Syst."},{"key":"32_CR19","unstructured":"Dastanian, R., Shahhoseini, H.S.: Multi secret sharing scheme for encrypting two secret images into two shares. In: International Conference on Information and Electronics Engineering IPCSIT, vol. 6. IEEE, Washington (2011)"},{"issue":"1","key":"32_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.sigpro.2010.06.012","volume":"91","author":"T-H Chen","year":"2011","unstructured":"Chen, T.-H., Chang-Sian, W.: Efficient multi-secret image sharing based on boolean operations. Sig. Process. 91(1), 90\u201397 (2011)","journal-title":"Sig. Process."},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Tentu, A.N., Rao, A.A.: Efficient verifiable multi-secret sharing based on YCH scheme. In: Cryptography and Security Systems, pp. 100\u2013109. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-44893-9_9"},{"key":"32_CR22","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.tcs.2012.05.006","volume":"445","author":"C Hu","year":"2012","unstructured":"Hu, C., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theoret. Comput. Sci. 445, 52\u201362 (2012)","journal-title":"Theoret. Comput. Sci."},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2014.08.046","volume":"294","author":"S Mashhadi","year":"2015","unstructured":"Mashhadi, S., Dehkordi, M.H.: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inf. Sci. 294, 31\u201340 (2015)","journal-title":"Inf. Sci."},{"issue":"15","key":"32_CR24","doi-asserted-by":"publisher","first-page":"2889","DOI":"10.1016\/j.ins.2010.04.015","volume":"180","author":"Z Eslami","year":"2010","unstructured":"Eslami, Z., Ahmadabadi, J.Z.: A verifiable multi-secret sharing scheme based on cellular automata. Inf. Sci. 180(15), 2889\u20132894 (2010)","journal-title":"Inf. Sci."},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. Adv. Cryptology, pp. 10\u201318. Springer, Heidelberg (1985)","DOI":"10.1007\/3-540-39568-7_2"},{"issue":"2","key":"32_CR26","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T03:32:58Z","timestamp":1718249578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}