{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:13:13Z","timestamp":1725516793189},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540697329"},{"type":"electronic","value":"9783540697336"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69733-6_23","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:07:43Z","timestamp":1218542863000},"page":"225-234","source":"Crossref","is-referenced-by-count":3,"title":["Visual Cryptography on Graphs"],"prefix":"10.1007","author":[{"given":"Steve","family":"Lu","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Manchala","sequence":"additional","affiliation":[]},{"given":"Rafail","family":"Ostrovsky","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/3-540-61440-0_147","volume-title":"Automata, Languages and Programming","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and Bounds for Visual Cryptography. In: auf der Heide, F.M., Monien, B. (eds.) ICALP 1996. LNCS, vol.\u00a01099, pp. 416\u2013428. Springer, Heidelberg (1996)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual Cryptography for General Access Structures. Electronic Colloquium on Computational Complexity\u00a03(12) (1996)","DOI":"10.1006\/inco.1996.0076"},{"issue":"1-2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0304-3975(99)00127-9","volume":"250","author":"G. Ateniese","year":"2001","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended Capabilities for Visual Cryptography. heor. Comput. Sci.\u00a0250(1-2), 143\u2013161 (2001)","journal-title":"heor. Comput. Sci."},{"issue":"1\u20133","key":"23_CR4","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.tcs.2006.08.008","volume":"369","author":"C. Blundo","year":"2006","unstructured":"Blundo, C., Cimato, S., De Santis, A.: De: Visual Cryptography Schemes with Optimal Pixel Expansion. Theor. Comput. Sci.\u00a0369(1\u20133), 169\u2013182 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"J.C. Benaloh","year":"1990","unstructured":"Benaloh, J.C., Leichter, J.: Generalized Secret Sharing and Monotone Functions. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 27\u201335. Springer, Heidelberg (1990)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Blakley, G.: Safeguarding Cryptographic Keys. In: Proc. Am. Federation of Information Processing Soc., pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/3-540-48658-5_17","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C. Blundo","year":"1994","unstructured":"Blundo, C., De Santis, A., Di Crescenzo, G., Gaggia, A.G., Vaccaro, U.: Multi-secret Sharing Schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 150\u2013163. Springer, Heidelberg (1994)"},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF00204801","volume":"8","author":"C. Blundo","year":"1995","unstructured":"Blundo, C., De Santis, A., Stinson, D.R., Vaccaro, U.: Graph Decompositions and Secret Sharing Schemes. J. Cryptology\u00a08(1), 39\u201364 (1995)","journal-title":"J. Cryptology"},{"issue":"2","key":"23_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1023\/A:1008216403325","volume":"11","author":"C. Blundo","year":"1997","unstructured":"Blundo, C., De Santis, A., De Simone, R., Vaccaro, U.: Tight Bounds on the Information Rate of Secret Sharing Schemes. Des. Codes Cryptography\u00a011(2), 107\u2013110 (1997)","journal-title":"Des. Codes Cryptography"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1007\/3-540-56503-5_68","volume-title":"STACS 93","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Vaccaro, U.: Efficient Sharing of Many Secrets. In: Enjalbert, P., Wagner, K.W., Finkel, A. (eds.) STACS 1993. LNCS, vol.\u00a0665, pp. 692\u2013703. Springer, Heidelberg (1993)"},{"issue":"1-3","key":"23_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0304-3975(02)00399-7","volume":"295","author":"G. Di Crescenzo","year":"2003","unstructured":"Di Crescenzo, G.: Sharing One Secret vs. Sharing Many Secrets. Theor. Comput. Sci.\u00a0295(1-3), 123\u2013140 (2003)","journal-title":"Theor. Comput. Sci."},{"key":"23_CR12","unstructured":"Csirmaz, L.: Secret Sharing Schemes on Graphs. Cryptology ePrint Archive, Report 2005\/059 (2005), http:\/\/eprint.iacr.org\/"},{"key":"23_CR13","unstructured":"Chen, K.Y., Wu, W.P., Laih, C.S.: On the (2,2) Visual Multi-secret Sharing Schemes (2006)"},{"key":"23_CR14","unstructured":"Itoh, M., Saito, A., Nishizeki, T.: Secret Sharing Scheme Realizing General Access Structure. In: Proc. of IEEE Globecom, pp. 99\u2013102 (1987)"},{"issue":"10","key":"23_CR15","first-page":"2577","volume":"E86.A","author":"M. Iwamoto","year":"2003","unstructured":"Iwamoto, M., Yamamoto, H.: A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images. IEICE Trans. on Fundamentals\u00a0E86.A(10), 2577\u20132588 (2003)","journal-title":"IEICE Trans. on Fundamentals"},{"issue":"7","key":"23_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1002\/(SICI)1520-6440(199807)81:7<55::AID-ECJC7>3.0.CO;2-#","volume":"81","author":"T. Katoh","year":"1998","unstructured":"Katoh, T., Imai, H.: An Extended Construction Method for Visual Secret Sharing Schemes. Electronics and Communications in Japan (Part III: Fundamental Electronic Science)\u00a081(7), 55\u201363 (1998)","journal-title":"Electronics and Communications in Japan (Part III: Fundamental Electronic Science)"},{"issue":"4","key":"23_CR17","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1137\/0215074","volume":"15","author":"M. Luby","year":"1986","unstructured":"Luby, M.: A Simple Parallel Algorithm for the Maximal Independent Set Problem. SIAM J. Comput.\u00a015(4), 1036\u20131055 (1986)","journal-title":"SIAM J. Comput."},{"key":"23_CR18","unstructured":"Manchala, D., Lu, S., Ostrovsky, R.: Visual Cryptography on Graphs. Cryptology ePrint Archive (2008), http:\/\/eprint.iacr.org\/"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 1\u201312. Springer, Heidelberg (1995)"},{"issue":"11","key":"23_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/18.272461","volume":"40","author":"D. Stinson","year":"1994","unstructured":"Stinson, D.: Decomposition Constructions for Secret Sharing Schemes. IEEE Transactions on Information Theory\u00a040(1), 118\u2013125 (1994)","journal-title":"IEEE Transactions on Information Theory"},{"key":"23_CR22","unstructured":"Wang, D., Yi, F., Li, X., Luo, P., Dai, Y.: On the Analysis and Generalization of Extended Visual Cryptography Schemes (2006)"},{"issue":"4","key":"23_CR23","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1080\/10020070612330015","volume":"16","author":"F. Yi","year":"2006","unstructured":"Yi, F., Wang, D., Luo, P., Huang, L., Dai, Y.: Multi Secret Image Color Visual Cryptography Schemes for General Access Structures. Progress in Natural Science\u00a016(4), 431\u2013436 (2006)","journal-title":"Progress in Natural Science"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69733-6_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T10:46:17Z","timestamp":1684493177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69733-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540697329","9783540697336"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69733-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}