{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:49Z","timestamp":1740099049769,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319766195"},{"type":"electronic","value":"9783319766201"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76620-1_16","type":"book-chapter","created":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T09:46:18Z","timestamp":1519724778000},"page":"267-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi-secret Sharing Scheme for Level-Ordered Access Structures"],"prefix":"10.1007","author":[{"given":"Appala Naidu","family":"Tentu","sequence":"first","affiliation":[]},{"given":"Abdul","family":"Basit","sequence":"additional","affiliation":[]},{"given":"K.","family":"Bhavani","sequence":"additional","affiliation":[]},{"given":"V. Ch.","family":"Venkaiah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,28]]},"reference":[{"issue":"11","key":"16_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"16_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. AFIPS 48, 313\u2013317 (1979)","journal-title":"AFIPS"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume-title":"Advances in Cryptology \u2014 CRYPTO 1988","author":"GJ Simmons","year":"1990","unstructured":"Simmons, G.J.: How to (really) share a secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390\u2013448. Springer, New York (1990). \nhttps:\/\/doi.org\/10.1007\/0-387-34799-2_30"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-540-24638-1_26","volume-title":"Theory of Cryptography","author":"T Tassa","year":"2004","unstructured":"Tassa, T.: Hierarchical threshold secret sharing. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 473\u2013490. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24638-1_26"},{"key":"16_CR5","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s00145-008-9027-9","volume":"22","author":"T Tassa","year":"2009","unstructured":"Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22, 227\u2013258 (2009)","journal-title":"J. Cryptol."},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/BFb0053748","volume-title":"Information Security and Privacy","author":"H Ghodosi","year":"1998","unstructured":"Ghodosi, H., Pieprzyk, J., Safavi-Naini, R.: Secret sharing in multilevel and compartmented groups. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 367\u2013378. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/BFb0053748"},{"key":"16_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-54525-2_23","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"AN Tentu","year":"2014","unstructured":"Tentu, A.N., Paul, P., Venkaiah, V.C.: Computationally perfect secret sharing scheme based on error-correcting codes. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 251\u2013262. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-642-54525-2_23"},{"issue":"4","key":"16_CR8","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1504\/IJTMCC.2014.067378","volume":"2","author":"AN Tentu","year":"2014","unstructured":"Tentu, A.N., Paul, P., Venkaiah, V.C.: Computationally perfect secret sharing schemes based on MDS codes. Int. J. Trust Manag. Comput. Commun. (IJTMCC) 2(4), 353\u2013378 (2014)","journal-title":"Int. J. Trust Manag. Comput. Commun. (IJTMCC)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Basit, A., Kumar, N.C., Venkaiah, V.C., Moiz, S.A., Tentu, A.N., Naik, W.: Multi-stage Multi-secret sharing scheme for hierarchical access structure. In: 2017 IEEE International Conference on Computing, Communication and Automation (ICCCA), Noida (2017, in press)","DOI":"10.1109\/CCAA.2017.8229863"},{"key":"16_CR10","unstructured":"Iftene, S.: Compartmented secret sharing based on the Chinese remainder theorem, Cryptology ePrint Archive, Report 2005\/4 08 (2005)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Singh, N., Tentu, A.N., Basit, A., Venkaiah, V.C.: Sequential secret sharing scheme based on Chinese remainder theorem. In: IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1\u20136 (2016)","DOI":"10.1109\/ICCIC.2016.7919678"},{"issue":"19","key":"16_CR12","doi-asserted-by":"crossref","first-page":"1591","DOI":"10.1049\/el:19941076","volume":"30","author":"J He","year":"1994","unstructured":"He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591\u20131592 (1994)","journal-title":"Electron. Lett."},{"issue":"4","key":"16_CR13","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1049\/el:19950201","volume":"31","author":"L Harn","year":"1995","unstructured":"Harn, L.: Comment: multistage secret sharing based on one-way function. Electron. Lett. 31(4), 262 (1995)","journal-title":"Electron. Lett."},{"issue":"1","key":"16_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/1044552.1044557","volume":"39","author":"T-Y Chang","year":"2005","unstructured":"Chang, T.-Y., Hwang, M.-S., Yang, W.-P.: A new multi-stage secret sharing scheme using one-way function. Oper. Syst. Rev. 39(1), 48\u201355 (2005)","journal-title":"Oper. Syst. Rev."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Chanu, O.B., Tentu, A.N., Venkaiah, V.C.: Multi-stage multi-secret sharing schemes based on Chinese remainder theorem. In: International Conference on Advanced Research in Computer Science Engineering Technology (ICARCSET 2015), Unnao, India, vol. 17, no. 6 (2015)","DOI":"10.1145\/2743065.2743082"},{"issue":"1","key":"16_CR16","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.csi.2006.02.004","volume":"29","author":"J Zhao","year":"2007","unstructured":"Zhao, J., Zhang, J., Zhao, R.: A practical verifiable multi-secret sharing scheme. Comput. Stand. Interfaces 29(1), 138\u2013141 (2007)","journal-title":"Comput. Stand. Interfaces"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Tentu, A.N., Mahapatra, B., Venkaiah, V.C., Prasad, V.K.: New secret sharing scheme for multipartite access structures with threshold changeability. In: International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, Kochi, India, 10\u201313 Aug 2015","DOI":"10.1109\/ICACCI.2015.7275897"},{"issue":"2","key":"16_CR18","first-page":"23","volume":"5","author":"M Nojoumian","year":"2015","unstructured":"Nojoumian, M., Stinson, D.R.: Sequential secret sharing as a new hierarchical access structure. J. Internet Serv. Inf. Secur. (JISIS) 5(2), 23\u201331 (2015)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"5","key":"16_CR19","first-page":"874","volume":"18","author":"KP Dileep","year":"2016","unstructured":"Dileep, K.P., Tentu, A.N., Venkaiah, V.C., Apparao, A.: Sequential secret sharing scheme based on level ordered access structure. J. Netw. Secur. 18(5), 874\u2013881 (2016)","journal-title":"J. Netw. Secur."}],"container-title":["Lecture Notes in Computer Science","Number-Theoretic Methods in Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76620-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T09:52:52Z","timestamp":1519725172000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76620-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319766195","9783319766201"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76620-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}