{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:41:04Z","timestamp":1751568064964},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_5","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"35-42","source":"Crossref","is-referenced-by-count":25,"title":["Shadow Generation Protocol in Linguistic Threshold Schemes"],"prefix":"10.1007","author":[{"given":"Marek R.","family":"Ogiela","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Urszula","family":"Ogiela","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C.A. Asmuth","year":"1983","unstructured":"Asmuth, C.A., Bloom, J.: A modular approach to key safeguarding. IEEE Transactions on Information Theory\u00a029, 208\u2013210 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/3-540-61440-0_147","volume-title":"Automata, Languages and Programming","author":"G. Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol.\u00a01099, pp. 416\u2013428. Springer, Heidelberg (1996)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/3-540-49264-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"P. Beguin","year":"1995","unstructured":"Beguin, P., Cresti, A.: General short computational secret sharing schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 194\u2013208. Springer, Heidelberg (1995)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/18.335890","volume":"40","author":"A. Beimel","year":"1994","unstructured":"Beimel, A., Chor, B.: Universally ideal secret sharing schemes. IEEE Transactions on Information Theory\u00a040, 786\u2013794 (1994)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1007\/3-540-48071-4_38","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"B. Blakley","year":"1993","unstructured":"Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.: Threshold schemes with disenrollment. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 540\u2013548. Springer, Heidelberg (1993)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/S0020-0190(97)00135-X","volume":"63","author":"C. Blundo","year":"1997","unstructured":"Blundo, C., De Santis, A.: Lower bounds for robust secret sharing schemes. Inform. Process. Lett.\u00a063, 317\u2013321 (1997)","journal-title":"Inform. Process. Lett."},{"key":"5_CR8","first-page":"61","volume":"17","author":"C. Charnes","year":"1995","unstructured":"Charnes, C., Pieprzyk, J.: Generalised cumulative arrays and their application to secret sharing schemes. Australian Computer Science Communications\u00a017, 61\u201365 (1995)","journal-title":"Australian Computer Science Communications"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/BF01398012","volume":"6","author":"M. Dijk van","year":"1995","unstructured":"van Dijk, M.: On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography\u00a06, 143\u2013169 (1995)","journal-title":"Designs, Codes and Cryptography"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MC.2007.142","volume":"40","author":"N. Hang","year":"2007","unstructured":"Hang, N., Zhao, W.: Privacy-preserving data mining Systems. Computer\u00a040(4), 52\u201358 (2007)","journal-title":"Computer"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s001459900014","volume":"9","author":"W.-A. Jackson","year":"1996","unstructured":"Jackson, W.-A., Martin, K.M., O\u2019Keefe, C.M.: Ideal secret sharing schemes with multiple secrets. Journal of Cryptology\u00a09, 233\u2013250 (1996)","journal-title":"Journal of Cryptology"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U.: Linguistic Extension for Secret Sharing (m, n)-threshold Schemes. In: SecTech 2008 - 2008 International Conference on Security Technology, Hainan Island, Sanya, China, December 13-15, pp. 125\u2013128 (2008), ISBN: 978-0-7695-3486-2, doi:10.1109\/SecTech.2008.15","DOI":"10.1109\/SecTech.2008.15"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM, 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"5_CR15","first-page":"441","volume-title":"The Science of Information Integrity","author":"G.J. Simmons","year":"1992","unstructured":"Simmons, G.J.: An Introduction to Shared Secret and\/or Shared Control Schemes and Their Application in Contemporary Cryptology. In: The Science of Information Integrity, pp. 441\u2013497. IEEE Press, Los Alamitos (1992)"},{"key":"5_CR16","first-page":"259","volume":"1","author":"S. Tang","year":"2004","unstructured":"Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science\u00a01, 259\u2013262 (2004)","journal-title":"Journal of Information and Computational Science"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:35:59Z","timestamp":1606185359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}