{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:39:38Z","timestamp":1753886378944},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000445","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"331-341","source":"Crossref","is-referenced-by-count":3,"title":["Security of the center in key distribution schemes"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Koji","family":"Okada","sequence":"additional","affiliation":[]},{"given":"Keiichi","family":"Sakano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"R.Blom: An Optimal Class of Symmetric Key Generation Systems. Eurocrypt'84, pp.335\u2013338 (1984)","DOI":"10.1007\/3-540-39757-4_22"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"C.Blundo, A.De Santis, A.Herzberg, S.Kutten, U.Vaccaro and M.Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. Crypto'92 (1992)","DOI":"10.1007\/3-540-48071-4_33"},{"key":"26_CR3","unstructured":"A.Beimel and B.Chor: Interaction in Key Distribution Schemes. Crypto'93 (1993)"},{"key":"26_CR4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L. Gong","year":"1990","unstructured":"L.Gong and D.J.Wheeler: A matrix Key-Distribution Scheme. Journal of Cryptology, 2, pp. 51\u201359 (1990)","journal-title":"Journal of Cryptology"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"T.Matsumoto and I.Imai: On the Key Predistribution Systems: A Practical Solution to the Key Distribution Problem. Crypto'87, pp.185\u2013193 (1988)","DOI":"10.1007\/3-540-48184-2_14"},{"issue":"4","key":"26_CR6","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/49.17711","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"E.Okamoto and K.Tanaka: Key Distribution System Based on Identification Information. IEEE J. on Selected Areas in Communications, 7(4), pp. 481\u2013485 (1989)","journal-title":"IEEE J. on Selected Areas in Communications"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"S.Tsujii and J.Chao: A New ID-based Key Sharing Scheme. Crypto'91, pp.288\u2013299 (1991)","DOI":"10.1007\/3-540-46766-1_23"},{"key":"26_CR8","unstructured":"Y.Desmedt and Y.Frankel: Shared Generation of Authenticators and Signatures. In Advances in Cryptology. Proc. of Crypto'91, pp.11\u201315 (1991)"},{"key":"26_CR9","volume-title":"Information Theory and Reliable Communications","author":"R.G. Gallager","year":"1968","unstructured":"R.G.Gallager: Information Theory and Reliable Communications. John Wiley & Sons, New York, NY (1968)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T02:17:32Z","timestamp":1586485052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/bfb0000445","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}