{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:23:22Z","timestamp":1725492202610},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714408"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71441-5_99","type":"book-chapter","created":{"date-parts":[[2007,7,5]],"date-time":"2007-07-05T17:14:41Z","timestamp":1183655681000},"page":"911-918","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Threshold Multi-group-Secret Sharing Scheme"],"prefix":"10.1007","author":[{"given":"Hui-Xian","family":"Li","sequence":"first","affiliation":[]},{"given":"Liao-Jun","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Wan-Dong","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","first-page":"158","volume-title":"Information Security","author":"Y. Desmedt","year":"1997","unstructured":"Desmedt, Y.: Some recent research aspects of threshold cryptography. In: Okamoto, R., Davida, G., Mambo, M. (eds.) Information Security, pp. 158\u2013173. Springer, Berlin (1997)"},{"key":"99_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"99_CR3","first-page":"313","volume-title":"Proceedings of AFIPS","author":"G. Blakley","year":"1979","unstructured":"Blakley, G.: Safeguarding cryptographic key. In: Merwin, R.E., Zanca, J.T., Smith, M. (eds.) Proceedings of AFIPS, pp. 313\u2013317. AFIPS Press, New York (1979)"},{"key":"99_CR4","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"IT-29","author":"C. Asmuth","year":"1983","unstructured":"Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Transactions on Information Theory\u00a0IT-29, 208\u2013210 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"99_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0304-3975(02)00399-7","volume":"295","author":"G.D. Crescenzo","year":"2003","unstructured":"Crescenzo, G.D.: Sharing one secret vs. sharing many secrets. Theoret. Comput. Sci.\u00a0295, 123\u2013140 (2003)","journal-title":"Theoret. Comput. Sci."},{"key":"99_CR6","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1049\/ip-cdt:19951874","volume":"142","author":"L. Harn","year":"1995","unstructured":"Harn, L.: Efficient sharing (broadcasting) of multiple secrets. IEE Proceedings-\u2014Computers and Digital Techniques\u00a0142, 237\u2013240 (1995)","journal-title":"IEE Proceedings-\u2014Computers and Digital Techniques"},{"key":"99_CR7","unstructured":"Chien, H.Y., Jan, J.K., Tseng, Y.M.: A practical (t, n) multi-secret sharing scheme. IEICE Transactions on Fundamentals E83-A, 2762-2765 (2000)"},{"key":"99_CR8","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/11596981_61","volume-title":"Computational Intelligence and Security","author":"H.X. Li","year":"2005","unstructured":"Li, H.X., Cheng, C.T., Pang, L.J.: A new (t, n)-threshold multi-secret sharing scheme. In: Hao, Y., Liu, J., Wang, Y., et al. (eds.) Computational Intelligence and Security, pp. 421\u2013426. Springer, Berlin (2005)"},{"key":"99_CR9","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.amc.2004.06.120","volume":"167","author":"L.J. Pang","year":"2005","unstructured":"Pang, L.J., Wang, Y.M.: A new (t, n) multi-secret sharing scheme based on Shamir\u2019s secret sharing. Appl. Math. & Compt\u00a0167, 840\u2013848 (2005)","journal-title":"Appl. Math. & Compt"},{"key":"99_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.amc.2004.04.081","volume":"166","author":"C.W. Chan","year":"2005","unstructured":"Chan, C.W., Chang, C.C.: A scheme for threshold multi-secret sharing. Appl. Math. & Compt\u00a0166, 1\u201314 (2005)","journal-title":"Appl. Math. & Compt"},{"key":"99_CR11","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Info. Theory\u00a0IT-31, 469\u2013472 (1985)","journal-title":"IEEE Trans. on Info. Theory"},{"key":"99_CR12","volume-title":"Elementary methods in number theory","author":"M.B. Nathanson","year":"2000","unstructured":"Nathanson, M.B.: Elementary methods in number theory. Springer, New York (2000)"}],"container-title":["Advances in Soft Computing","Fuzzy Information and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71441-5_99.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:20:59Z","timestamp":1605763259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71441-5_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714408"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71441-5_99","relation":{},"subject":[]}}