{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:52:27Z","timestamp":1753887147418},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1993,5,1]],"date-time":"1993-05-01T00:00:00Z","timestamp":736214400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1993,5]]},"DOI":"10.1007\/bf01388411","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T08:31:01Z","timestamp":1112430661000},"page":"127-134","source":"Crossref","is-referenced-by-count":22,"title":["On 2-level secret sharing"],"prefix":"10.1007","volume":"3","author":[{"given":"Albrecht","family":"Beutelspacher","sequence":"first","affiliation":[]},{"given":"Ferenc","family":"Wettl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","series-title":"CISM Courses and Lectures","first-page":"161","volume-title":"Applications of finite geometry to cryptography","author":"A. Beutelspacher","year":"1990","unstructured":"Beutelspacher A. 1990. Applications of finite geometry to cryptography. CISM Courses and Lectures No. 313, New York: Springer-Verlag Wien, pp. 161?186."},{"key":"CR2","first-page":"117","volume":"14","author":"A. Bichara","year":"1982","unstructured":"Bichara, A. and Korchm\u00e1ros, G. 1982. Note on (q+2)-sets in a Galois plane of orderq.Annals of Discrete Math. 14: 117?122.","journal-title":"Annals of Discrete Math."},{"key":"CR3","series-title":"Proc. NCC","first-page":"317","volume-title":"Safeguarding cryptographic keys","author":"G.R. Blakley","year":"1979","unstructured":"Blakley, G.R. 1979. Safeguarding cryptographic keys.Proc. NCC 48, AFIPS Press, Montvale, N.J., pp. 317?319."},{"key":"CR4","first-page":"1","volume":"35","author":"A. Blokhuis","year":"1990","unstructured":"Blokhuis, A., Bruen, A.A., and Thas, J.A. 1990. Arcs inPG(n,q), MDS codes and three fundamental problems of B. Segre?some extensions.Geom. Dedicate 35: 1?11.","journal-title":"Geom. Dedicate"},{"key":"CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-62012-6","volume-title":"Finite Geometries","author":"P. Dembowski","year":"1968","unstructured":"Dembowski, P. 1968.Finite Geometries. Berlin-Heidelberg-New York: Springer-Verlag."},{"key":"CR6","volume-title":"General Galois Geometries","author":"J.W.P. Hirschfeld","year":"1991","unstructured":"Hirschfeld, J.W.P. and Thas, J.A. 1991.General Galois Geometries, Oxford: Oxford Univ. Press."},{"key":"CR7","unstructured":"Jackson, W.-A. 1989. On design which admit specific automorphisms. Ph.D. Thesis, Royal Holloway and Bedford New College, University of London."},{"key":"CR8","first-page":"303","volume":"23","author":"N.M. Hy","year":"1972","unstructured":"Hy, N.M. 1972. P\u00e1ratlan rend? affin Galois sikok ellipszise, mint affin szab\u00e1lyos soksz\u00f6g, (in Hungarian)Mat. Lapok 23: 303?312.","journal-title":"Mat. Lapok"},{"key":"CR9","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TIT.1986.1057188","volume":"32","author":"G. Seroussi","year":"1986","unstructured":"Seroussi, G. and Roth, R.M. 1986. On M.D.S. extensions of generalized Reed-Solomon codes.IEEE Transactions Inform. Theory IT-32: 349?354.","journal-title":"IEEE Transactions Inform. Theory"},{"key":"CR10","doi-asserted-by":"crossref","unstructured":"Shamir, A. How to shear a secret.Comm. ACM 22: 612?613.","DOI":"10.1145\/359168.359176"},{"key":"CR11","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume":"403","author":"G.J. Simmons","year":"1989","unstructured":"Simmons, G.J. 1989. How to (really) share a secret.Advances in Cryptology?CRYPTO 88, LNCS 403: 390?448.","journal-title":"Advances in Cryptology?CRYPTO 88, LNCS"},{"key":"CR12","first-page":"181","volume":"73","author":"G.J. Simmons","year":"1990","unstructured":"Simmons, G.J. 1990. Sharply focused sets of lines on a conic inPG(2,q).Congressus Numerantium 73: 181?204.","journal-title":"Congressus Numerantium"},{"key":"CR13","unstructured":"Storme, L. and Sz\u00f6nyi, T. (k+1)-arcs inPG(n, q),n?3, containingk points of a normal rational curve,q even. (submitted to Journal of Geometry)"},{"key":"CR14","unstructured":"Storme, L. and Sz?nyi, T. (k+1)-arcs inPG(n, q),n?3, containingk points of a normal rational curve,q odd, (in preparation)."},{"key":"CR15","series-title":"Advances in Finite Geometries and Designs","first-page":"407","volume-title":"Generalized Reed-Solomon codes and rational curves: An improvement of results by Seroussi and Roth","author":"L. Storme","year":"1991","unstructured":"Storme, L. and Thas, J.A. 1991. Generalized Reed-Solomon codes and rational curves: An improvement of results by Seroussi and Roth.Advances in Finite Geometries and Designs, Oxford-New York-Tokyo: Oxford University Press, pp. 407?419."},{"key":"CR16","unstructured":"Sz?nyi, T. 1991.k-sets inPG(2,q) having a large set of internal nuclei.Proc. ?Combinatorice '88?."},{"key":"CR17","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF01227813","volume":"30","author":"F. Wettl","year":"1987","unstructured":"Wettl, F. 1987. On the nuclei of a pointset of a finite projective plane.J. of Geometry 30: 157?163.","journal-title":"J. of Geometry"},{"key":"CR18","series-title":"Advances in Finite Geometries and Designs","first-page":"407","volume-title":"Internal nuclei ofk-sets in finite projective spaces of three dimensions","author":"F. Wettl","year":"1991","unstructured":"Wettl, F. 1991. Internal nuclei ofk-sets in finite projective spaces of three dimensions.Advances in Finite Geometries and Designs, Oxford-New York-Tokyo: Oxford University Press, pp. 407?419."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388411\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388411.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388411\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T16:32:25Z","timestamp":1586190745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,5]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1993,5]]}},"alternative-id":["BF01388411"],"URL":"https:\/\/doi.org\/10.1007\/bf01388411","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,5]]}}}