{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:46:42Z","timestamp":1725461202396},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304279"},{"type":"electronic","value":"9783642304286"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30428-6_16","type":"book-chapter","created":{"date-parts":[[2012,5,23]],"date-time":"2012-05-23T12:03:15Z","timestamp":1337774595000},"page":"190-197","source":"Crossref","is-referenced-by-count":0,"title":["A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes"],"prefix":"10.1007","author":[{"given":"Jia","family":"Yu","sequence":"first","affiliation":[]},{"given":"Shuguang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huawei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Minglei","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Jialiang","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"16_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"16_CR2","first-page":"313","volume-title":"Proc. AFIPS 1979 National Computer Conference","author":"G.R. Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. AFIPS 1979 National Computer Conference, vol.\u00a048, pp. 313\u2013317. AFIPS Press, NJ (1979)"},{"key":"16_CR3","first-page":"427","volume-title":"Proc. 28th Annual FOCS","author":"P. Feldman","year":"1987","unstructured":"Feldman, P.: A Pratical Scheme for Non-Interactive Verifiable Secret Sharing. In: Proc. 28th Annual FOCS, pp. 427\u2013437. IEEE Press, New York (1987)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"T.P. Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg (1992)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"B. Schoenmakers","year":"1999","unstructured":"Schoenmakers, B.: A simple Publicly Verifiable Secret Sharing Scheme and its Application to Electronic Voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 148\u2013164. Springer, Heidelberg (1999)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Stadler","year":"1996","unstructured":"Stadler, M.: Publicly Verifiable Secret Sharing. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 190\u2013199. Springer, Heidelberg (1996)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/BFb0054115","volume-title":"Advances in Cryptology - EUROCRYPT \u201998","author":"E. Fujisaki","year":"1998","unstructured":"Fujisaki, E., Okamoto, T.: A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 32\u201346. Springer, Heidelberg (1998)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/3-540-44586-2_21","volume-title":"Public Key Cryptography","author":"A. Young","year":"2001","unstructured":"Young, A., Yung, M.: A PVSS as Hard as Discrete Log and Shareholder Separability. In: Kim, K. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 287\u2013299. Springer, Heidelberg (2001)"},{"key":"16_CR9","unstructured":"Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its application. Technical Report ISSE TR-97-01, George Mason University (1997)"},{"key":"16_CR10","first-page":"94","volume-title":"Proc. of the 1st International IEEE Security in Storage Workshop","author":"T.M. Wong","year":"2002","unstructured":"Wong, T.M., Wang, C.X., Wing, J.M.: Verifiable secret redistribution for archive systems. In: Proc. of the 1st International IEEE Security in Storage Workshop, pp. 94\u2013106. IEEE Press, New York (2002)"},{"key":"16_CR11","first-page":"8","volume-title":"The First International Conference on Availability, Reliability and Security 2006","author":"V. Gupta","year":"2006","unstructured":"Gupta, V., Gopinaph, K.: An Extended Verifiable Secret Redistribution Protocol for Archival Systems. In: The First International Conference on Availability, Reliability and Security 2006, pp. 8\u201315. IEEE Press, New York (2006)"},{"key":"16_CR12","unstructured":"Yu, J., Kong, F.Y., Li, D.X.: Verifiable Secret Redistribution for PPS Schemes. In: Proc. of the 2nd Information Security Practice and Experience Conference; Journal of Shanghai Jiaotong University(Science), vol.\u00a0E-11(2), pp. 71\u201376 (2006)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11689522_13","volume-title":"Information Security Practice and Experience","author":"X. Li","year":"2006","unstructured":"Li, X., He, M.X.: A Protocol of Member-Join in a Secret Sharing Scheme. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol.\u00a03903, pp. 134\u2013141. Springer, Heidelberg (2006)"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/SNPD.2007.555","volume-title":"the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing","author":"J. Yu","year":"2007","unstructured":"Yu, J., Kong, F.Y., Hao, R.: Publicly Verifiable Secret Sharing with Enrollment Ability. In: the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, pp. 194\u2013199. IEEE Computer Society, New York (2007)"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-69304-8_15","volume-title":"Intelligence and Security Informatics","author":"J. Yu","year":"2008","unstructured":"Yu, J., Kong, F.Y., Hao, R., Li, X.L.: How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. In: Yang, C.C., Chen, H., Chau, M., Chang, K., Lang, S.-D., Chen, P.S., Hsieh, R., Zeng, D., Wang, F.-Y., Carley, K.M., Mao, W., Zhan, J. (eds.) ISI Workshops 2008. LNCS, vol.\u00a05075, pp. 138\u2013148. Springer, Heidelberg (2008)"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-642-22039-5_7","volume-title":"Intelligence and Security Informatics","author":"J. Yu","year":"2011","unstructured":"Yu, J., Kong, F.Y., Cheng, X.G., Hao, R.: Two Protocols for Member Revocation in Secret Sharing Schemes. In: Chau, M., Wang, G.A., Zheng, X., Chen, H., Zeng, D., Mao, W. (eds.) PAISI 2011. LNCS, vol.\u00a06749, pp. 64\u201370. Springer, Heidelberg (2011)"},{"issue":"4","key":"16_CR17","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on IT\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. on IT"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30428-6_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:13Z","timestamp":1620128353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30428-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304279","9783642304286"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30428-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}