{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:35:44Z","timestamp":1725870944485},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491745"},{"type":"electronic","value":"9783319491752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_5","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T06:59:42Z","timestamp":1478674782000},"page":"95-113","source":"Crossref","is-referenced-by-count":3,"title":["Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography"],"prefix":"10.1007","author":[{"given":"Paolo","family":"D\u2019Arco","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roberto","family":"De Prisco","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yvo","family":"Desmedt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"5_CR1","unstructured":"International Business Times: Cisco Faces Challenges as Chinese Media Urge Switching to Domestic Products for National Security Reasons in Wake of NSA Surveillance Leaks. http:\/\/www.ibtimes.com\/cisco-faces-challenges-chinese-media-urge-switching-domestic-products-national-security-reasons-wake . Accessed 25 June 2013"},{"key":"5_CR2","unstructured":"The Telegraph: Russia spied on G20 leaders with USB sticks. http:\/\/www.telegraph.co.uk\/news\/worldnews\/europe\/russia\/10411473\/Russia-spied-on-G20-leaders-with-USB-sticks.html . Accessed 29 October 2013"},{"key":"5_CR3","unstructured":"The Telegraph: Indian High Commission returns to typewriters. http:\/\/www.telegraph.co.uk\/news\/worldnews\/asia\/india\/10339111\/Indian-High-Commission-returns-to-typewriters.html . Accessed 27 September 2013"},{"key":"5_CR4","unstructured":"Asharov, G., Lindell, Y.: A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation, September 2014. https:\/\/eprint.iacr.org\/2011\/136.pdf"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-47721-7_19","volume-title":"Advances in Cryptology \u2014 CRYPTO 1986","author":"JC Benaloh","year":"1987","unstructured":"Benaloh, J.C.: Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract). In: Odlyzko, A.M. (ed.) Crypto 1986. LNCS, vol. 263, pp. 251\u2013260. Springer, Heidelberg (1987). doi: 10.1007\/3-540-47721-7_19"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of STOC (1988)","DOI":"10.1145\/62212.62213"},{"key":"5_CR7","unstructured":"Chaum, D.: Secret-Ballot Receipts and Transparent Integrity. http:\/\/www.vreceipt.com\/article.pdf"},{"key":"5_CR8","volume-title":"Visual Cryptography and Secret Image Sharing","author":"S Cimato","year":"2012","unstructured":"Cimato, S., Yang, C.-N.: Visual Cryptography and Secret Image Sharing. CRC Press, Boca Raton (2012)"},{"issue":"1","key":"5_CR9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/comjnl\/bxh152","volume":"49","author":"S Cimato","year":"2006","unstructured":"Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97\u2013107 (2006)","journal-title":"Comput. J."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D. , Cr\u00e9peau, C., Damgaard, I.: Multiparty unconditionally secure protocols. In: Proceedings of STOC (1988)","DOI":"10.1145\/62212.62214"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-04268-8_2","volume-title":"Information Theoretic Security","author":"P D\u2019Arco","year":"2014","unstructured":"D\u2019Arco, P., Prisco, R.: Secure Two-Party Computation: A Visual Way. In: Padr\u00f3, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 18\u201338. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-04268-8_2"},{"issue":"3","key":"5_CR12","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.tcs.2003.12.018","volume":"314","author":"A Bonis De","year":"2004","unstructured":"De Bonis, A., De Santis, A.: Randomness in secret sharing and visual cryptography schemes. Theor. Comput. Sci. 314(3), 351\u2013374 (2004)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"5_CR13","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIFS.2014.2305574","volume":"9","author":"R Prisco De","year":"2014","unstructured":"De Prisco, R., De Santis, A.: On the relation of random grid and deterministic visual cryptography. IEEE Trans. Inf. Forensics Secur. 9(4), 653\u2013665 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"5_CR14","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377\u2013379 (1987)","journal-title":"Opt. Lett."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E.: Privacy and communication complexity. In: Proceedings of IEEE Symposium on Foundations of Computer Science (FOCS), pp. 416\u2013421 (1989)","DOI":"10.1109\/SFCS.1989.63512"},{"key":"5_CR16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.cose.2014.10.001","volume":"48","author":"Y-J Maeng","year":"2015","unstructured":"Maeng, Y.-J., Mohaisen, A., Lee, M.-K., Nyang, D.: Transaction authentication using complementary colors. Comput. Secur. 48, 167\u2013181 (2015)","journal-title":"Comput. Secur."},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi: 10.1007\/BFb0053419"},{"key":"5_CR18","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.patrec.2003.12.011","volume":"25","author":"C-N Yang","year":"2004","unstructured":"Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481\u2013494 (2004)","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Steele, A., Blanton, M.: PICCO: a general-purpose compiler for private distributed computation. In: Proceedings of the Conference on Computer and Communications Security, CCS13, Berlin, Germany, November 4\u20138, pp. 813\u2013826 (2013)","DOI":"10.1145\/2508859.2516752"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:10:35Z","timestamp":1498345835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}