{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:43:22Z","timestamp":1753886602008},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000446","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T11:27:29Z","timestamp":1128684449000},"page":"342-353","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Incidence structures for key sharing"],"prefix":"10.1007","author":[{"given":"Tsutomu","family":"Matsumoto","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"T. Matsumoto and H. Imai, \u201cOn the Key Predistribution System: A practical solution to the key distribution problem\u201d Advances in Cryptology: Proceedings of CRYPTO'87, Lecture Notes in Computer Science No. 293, pp. 185\u2013193, Springer-Verlag, 1987.","DOI":"10.1007\/3-540-48184-2_14"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"R. Blom, \u201cAn optimal class of symmetric key generation systems,\u201c Advances in Cryptology: Proceedings of EUROCRYPT'84, Lecture Notes in Computer Science No. 209, pp. 335\u2013338, Springer-Verlag, 1985.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"L. Gong and D. J. Wheeler, \u201cA matrix key-distribution scheme,\u201d Journal of Cryptology, Vol. 2, pp. 51\u201359, Springer-Verlag, 1990.","DOI":"10.1007\/BF02252869"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, \u201cPerfectly-secure key distribution for dynamic conferences,\u201d Advances in Cryptology: Proceedings of CRYPTO'92, Lecture Notes in Computer Science No. 740, pp. 471\u2013486, Springer-Verlag, 1993.","DOI":"10.1007\/3-540-48071-4_33"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"W.-A. Jackson, K. M. Martin, and C. M. O'Keefe, \u201cMultisecret threshold schemes,\u201d Advances in Cryptology: Proceedings of CRYPTO'93, Lecture Notes in Computer Science No. 773, pp. 126\u2013135, Springer-Verlag, 1994.","DOI":"10.1007\/3-540-48329-2_11"},{"key":"27_CR6","unstructured":"T. Matsumoto, \u201cA novel IC card for KPS-based cryptography,\u201d IFIP WG10.5 Workshop on Secure Design and Test of Crypto-Chips, Abstract, Gmunden, Austria, 1991."},{"key":"27_CR7","unstructured":"T. Beth, D. Jungnickel, and H. Lenz, Design Theory, B.I.-Wissenschaftsverlag, 1985."},{"key":"27_CR8","unstructured":"T. Matsumoto, \u201cEfficient algorithms for recursively defined incidence structures,\u201d in preparation."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T21:17:00Z","timestamp":1578518220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000446"}},"subtitle":["Extended abstract"],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/bfb0000446","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]},"assertion":[{"value":"8 September 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}