{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:22:47Z","timestamp":1773235367420,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540593393","type":"print"},{"value":"9783540492368","type":"electronic"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000423","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"42-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["On sharing many secrets"],"prefix":"10.1007","author":[{"given":"Wen -Ai","family":"Jackson","sequence":"first","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Christine M.","family":"O'Keefe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"4_CR1","volume-title":"A first course in combinatorial mathematics","author":"I. Anderson","year":"1989","unstructured":"I. Anderson: A first course in combinatorial mathematics, Clarendon Press, Oxford, 1989."},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/3-540-48071-4_13","volume":"740","author":"A. Beimel","year":"1993","unstructured":"A. Beimel and B. Chor: Universally ideal secret sharing schemes. Adv. in Cryptology \u2014CRYPTO'92, Lecture Notes in Comput. Sci, 740:183\u2013195, 1993.","journal-title":"Lecture Notes in Comput. Sci"},{"key":"4_CR3","volume-title":"Design Theory","author":"T. Beth","year":"1985","unstructured":"Th. Beth, D. Jungnickel and H. Lenz: Design Theory, Bibliographisches Institut, Mannheim, 1985."},{"key":"4_CR4","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley: Safeguarding cryptographic keys. Proceedings of AFIPS 1979 National Computer Conference 48 313\u2013317, 1979.","journal-title":"Proceedings of AFIPS 1979 National Computer Conference"},{"key":"4_CR5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume":"209","author":"R. Blom","year":"1984","unstructured":"R. Blom: An optimal class of symmetric key generation systems. Adv. in Cryptology \u2014EUROCRYPT'84, Lecture Notes in Comput. Sci., 209:335\u2013338, 1984.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"C. Blundo and A. Cresti: Space requirements for broadcast encryption. Presented at EUROCRYPT'94, 1994.","DOI":"10.1007\/BFb0053444"},{"key":"4_CR7","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/3-540-48329-2_10","volume":"773","author":"C. Blundo","year":"1994","unstructured":"C. Blundo, A. Cresti, A. De Santis, and U. Vaccaro: Fully dynamic secret sharing schemes. Adv. in Cryptology \u2014 CRYPTO'93, Lecture Notes in Comput. Sci., 773:110\u2013125, 1994.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume":"740","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, Perfectly-secure key distribution for dynamic conferences. Adv. in Cryptology \u2014CRYPTO'92, Lecture Notes in Comput. Sci., 740:471\u2013486, 1993.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR9","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1007\/3-540-56503-5_68","volume":"665","author":"C. Blundo","year":"1993","unstructured":"C. Blundo, A. De Santis and U. Vaccaro: Efficient Sharing of Many Secrets. Proceedings of STACS '93, Lecture Notes in Comput. Sci. 665 692\u2013703, 1993.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR10","first-page":"105","volume":"9","author":"E. F. Brickell","year":"1989","unstructured":"E. F. Brickell: Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput., 9:105\u2013113, 1989.","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"4_CR11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00196772","volume":"2","author":"E. F. Brickell","year":"1991","unstructured":"E. F. Brickell and D. M. Davenport: On the Classification of Ideal Secret Sharing Schemes. J. Cryptology 2 123\u2013134, 1991.","journal-title":"J. Cryptology"},{"key":"4_CR12","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02451112","volume":"2","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and D. R. Stinson: Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. J. Cryptology 2 153\u2013166, 1992.","journal-title":"J. Cryptology"},{"key":"4_CR13","unstructured":"R. A. Croft and S. P. Harris: Public-Key Cryptography and Re-usable Shared Secrets. Cryptography and Coding, H. J. Beker and F. C. Piper, Eds. Clarendon Press 255\u2013268, 1989."},{"key":"4_CR14","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1007\/3-540-48071-4_40","volume":"740","author":"L. Harn","year":"1993","unstructured":"L. Harn and H.-Y. Lin: An l-Span Generalized Secret Sharing Scheme. Proceedings of Crypto '92, Lecture Notes in Comput. Sci., 740:558\u2013565, 1993.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR15","unstructured":"W.-A. Jackson and K. M. Martin: Combinatorial Models for Perfect Secret Sharing Schemes. J. Comb. Math. Comb. Comput., to appear."},{"key":"4_CR16","unstructured":"W.-A. Jackson, K. M. Martin, and C. M. O'Keefe: A construction for multisecret threshold schemes. Submitted, 1993."},{"key":"4_CR17","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-48329-2_11","volume":"773","author":"W.-A. Jackson","year":"1994","unstructured":"W.-A. Jackson, K. M. Martin, and C. M. O'Keefe: Multisecret threshold schemes. Adv. in Cryptology \u2014CRYPTO'93, Lecture Notes in Comput. Sci., 773:126\u2013135, 1994.","journal-title":"Lecture Notes in Comput. Sci."},{"issue":"1","key":"4_CR18","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"IT-29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene and M. E. Hellman: On Secret Sharing Systems. IEEE Trans. Inf. Theory Vol IT-29 1 35\u201341, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-48285-7_11","volume":"765","author":"K. Kurosawa","year":"1994","unstructured":"K. Kurosawa, K. Okada, K. Sakano, W. Ogata and S. Tsujii: Nonperfect Secret Sharing Schemes and Matroids. Adv. in Cryptology \u2014EUROCRYPT'93, Lecture Notes in Comput. Sci., 765:126\u2013141, 1994.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR20","first-page":"65","volume":"14","author":"K. M. Martin","year":"1993","unstructured":"K. M. Martin: New Secret Sharing Schemes from Old. J. Comb. Math. Comb. Comput. 14 65\u201377, 1993.","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"4_CR21","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume":"293","author":"T. Matsumoto","year":"1988","unstructured":"T. Matsumoto and H. Imai: On the key predistribution system: a practical solution to the key distribution problem. Adv. in Cryptology \u2014CRYPTO'87, Lecture Notes in Comput. Sci., 293:185\u2013193, 1988.","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR22","volume-title":"Matroid Theory","author":"J. G. Oxley","year":"1992","unstructured":"J. G. Oxley: Matroid Theory. Oxford University Press, Oxford, 1992."},{"key":"4_CR23","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/0095-8956(92)90007-K","volume":"56","author":"P. D. Seymour","year":"1992","unstructured":"P. D. Seymour: On secret-sharing matroids. J. Combin. Theory Ser B, 56:69\u201373, 1992.","journal-title":"J. Combin. Theory Ser B"},{"issue":"11","key":"4_CR24","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir: How to Share a Secret. Comm. ACM Vol 22 11 612\u2013613, 1979.","journal-title":"ACM"},{"key":"4_CR25","unstructured":"G. J. Simmons: An Introduction to Shared Secret and\/or Shared Control Schemes and their Application. Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992."},{"key":"4_CR26","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson: An Explication of Secret Sharing Schemes. Des. Codes Cryptogr. 2 357\u2013390, 1992.","journal-title":"Des. Codes Cryptogr."},{"key":"4_CR27","first-page":"1124","volume":"9","author":"T. Uehara","year":"1986","unstructured":"T. Uehara, T. Nishizeki, and K. Nakamura: A secret sharing system with matroidal access structure. Trans. IECE Japan, J69-A 9:1124\u20131132, 1986.","journal-title":"Trans. IECE Japan, J69-A"},{"key":"4_CR28","volume-title":"Codes and Cryptography","author":"D. Welsh","year":"1988","unstructured":"D. Welsh: Codes and Cryptography. Clarendon Press, Oxford, 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T02:18:12Z","timestamp":1586485092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000423"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/bfb0000423","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"8 September 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}