{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:08:12Z","timestamp":1753888092719},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1993,7,1]],"date-time":"1993-07-01T00:00:00Z","timestamp":741484800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1993,7]]},"DOI":"10.1007\/bf01388483","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T09:22:20Z","timestamp":1112433740000},"page":"221-228","source":"Crossref","is-referenced-by-count":8,"title":["How to avoid the cheaters succeeding in the key sharing scheme"],"prefix":"10.1007","volume":"3","author":[{"given":"Josep","family":"Rifa-Coma","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","volume-title":"A Modular Approach to Key Safeguarding","author":"C. Asmuth","year":"1980","unstructured":"Asmuth, C. and Bloom, J. 1980. A Modular Approach to Key Safeguarding, Math. Dpt., Texas A&M University, College Station, Texas."},{"key":"CR2","unstructured":"Blakely, G.R. 1979. Safeguarding cryptographic keys, NCC 79, AFIPS, 313?317."},{"key":"CR3","doi-asserted-by":"crossref","unstructured":"Brickell, E.F. and Stinson, D.R. The detection of cheaters in threshold schemes,LNCS. 403, CRYTO'88, Berlin, New York: Springer-Verlag, pp. 564?577.","DOI":"10.1007\/0-387-34799-2_40"},{"key":"CR4","unstructured":"Davida, G.I., Demilo, R.A. and Lipton, R.J. 1980. Protecting shared cryptographic keys. Proc. 1980 Symp. on Security and Privacy,IEEE Computers Society. 100?102."},{"key":"CR5","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"R.J. McEliece","year":"1981","unstructured":"McEliece, R.J. and Sarwate, D.V. 1981. On sharing secrets and reed-solomon codes.Comm. of the ACM. 24:583?584.","journal-title":"Comm. of the ACM."},{"key":"CR6","volume-title":"The Theory of Information and Coding","author":"R.J. McEliece","year":"1977","unstructured":"McEliece, R.J., 1977.The Theory of Information and Coding, Reading, MA: Addison-Wesley."},{"key":"CR7","volume-title":"The Theory of Error Correcting and Codes","author":"F.J. MacWilliams","year":"1983","unstructured":"MacWilliams, F.J. and Sloane, N.J.A. 1983.The Theory of Error Correcting and Codes, North-Holland, Amsterdam, N.Y., Oxford."},{"key":"CR8","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"122","author":"A. Shamir","year":"1979","unstructured":"Shamir, A. 1979. How to share a secret, comm.ACM, 122:612.","journal-title":"ACM"},{"key":"CR9","unstructured":"Simmons, G. 1988. An introduction to Shared Secret Schemes and their Applications, Sandia Reports, SAND 88?2298."},{"key":"CR10","doi-asserted-by":"crossref","unstructured":"Tompa, M. and Woll, H. 1988. How to share a secret with cheaters.J. of Cryptology I. 133?138.","DOI":"10.1007\/BF02252871"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388483\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388483.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388483\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T16:35:36Z","timestamp":1586190936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,7]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,7]]}},"alternative-id":["BF01388483"],"URL":"https:\/\/doi.org\/10.1007\/bf01388483","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,7]]}}}