{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:15:41Z","timestamp":1773656141945,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540220602","type":"print"},{"value":"9783540247685","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_69","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"647-654","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block Design"],"prefix":"10.1007","author":[{"given":"Youngjoo","family":"Cho","sequence":"first","affiliation":[]},{"given":"Changkyun","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Ilyong","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","unstructured":"Chang, C., Wu, T., Chen, C.: The Design of a Conference Key Distribution System. In: Proc. of ASIACRYPT 1992, pp. 11.1\u201311.6 (1992)"},{"key":"69_CR2","volume-title":"Cryptography: An Introduction of Computer Security","author":"J. Seberry","year":"1988","unstructured":"Seberry, J., Pieprzyk, J.: Cryptography: An Introduction of Computer Security. Prentice-Hall, New York (1988)"},{"key":"69_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"69_CR4","series-title":"Lecture Notes in Computer Science","first-page":"186","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"A. Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature schemes. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"69_CR5","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1049\/el:19860880","volume":"22","author":"T. Okamoto","year":"1986","unstructured":"Okamoto, T.: Proposal for identity-based key distribution system. Electron. Lett.\u00a022, 1283\u20131284 (1986)","journal-title":"Electron. Lett."},{"key":"69_CR6","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"IT-28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference Key Distribution system. IEEE Trans. on Info. Theory\u00a0IT-28, 714\u2013720 (1982)","journal-title":"IEEE Trans. on Info. Theory"},{"key":"69_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-48184-2_13","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"K. Koyama","year":"1988","unstructured":"Koyama, K., Ohta, K.: Identity-Based Conference Key Distribution System. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 175\u2013184. Springer, Heidelberg (1988)"},{"key":"69_CR8","series-title":"Lecture Notes in Computer Science","first-page":"155","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"A. Shimbo","year":"1993","unstructured":"Shimbo, A., Kawamura, S.: Cryptoanalysis of several Conference Key Distribution Schemes. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 155\u2013160. Springer, Heidelberg (1993)"},{"key":"69_CR9","volume-title":"Block Designs in Introduction to Combinatorial Mathematics","author":"C. Liu","year":"1968","unstructured":"Liu, C.: Block Designs in Introduction to Combinatorial Mathematics. McGraw-Hill, New York (1968)"},{"key":"69_CR10","volume-title":"error Correcting Coding Theory","author":"M. Rhee","year":"1989","unstructured":"Rhee, M.: error Correcting Coding Theory. McGraw-Hill, New York (1989)"},{"key":"69_CR11","volume-title":"Codes and Cryptography","author":"D. Welsh","year":"1988","unstructured":"Welsh, D.: Codes and Cryptography. Oxford Science Pub., Oxford (1988)"},{"issue":"3","key":"69_CR12","first-page":"430","volume":"20","author":"J. Ryou","year":"1993","unstructured":"Ryou, J.: A Load Balancing Algorithm in Distributed Computing Systems. J. of Korea Info. Sci. Soc.\u00a020(3), 430\u2013441 (1993)","journal-title":"J. of Korea Info. Sci. Soc."},{"issue":"3B","key":"69_CR13","first-page":"330","volume":"24","author":"T. Lee","year":"1999","unstructured":"Lee, T., Chung, I.: The Design of Authentication Mechanism Employing the Block Design for Information Security in CORBA Environment. J. Korean Inst. of Commun. Sci.\u00a024(3B), 330\u2013337 (1999)","journal-title":"J. Korean Inst. of Commun. Sci."},{"key":"69_CR14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1017\/CBO9781107325425","volume-title":"Graph Theory, Coding Theory and Block Design","author":"P.J. Cameron","year":"1975","unstructured":"Cameron, P.J., Van Lint, J.H.: Graph Theory, Coding Theory and Block Design, p. 4. Cambridge University Press, Cambridge (1975)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_69.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:08:51Z","timestamp":1620011331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}