{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:23:22Z","timestamp":1705015402070},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2009,6,9]],"date-time":"2009-06-09T00:00:00Z","timestamp":1244505600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1007\/s10207-009-0085-2","type":"journal-article","created":{"date-parts":[[2009,6,8]],"date-time":"2009-06-08T10:07:28Z","timestamp":1244455648000},"page":"379-385","source":"Crossref","is-referenced-by-count":10,"title":["A secret sharing scheme based on (t, n) threshold and adversary structure"],"prefix":"10.1007","volume":"8","author":[{"given":"Huawang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Zhiquan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,9]]},"reference":[{"key":"85_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"11","author":"A. Shamir","year":"1979","unstructured":"Shamir A.: How to share a secret. Commun. ACM 11, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of AFIPS National Computer Conference, pp. 313\u2013317. New York (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"85_CR3","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing schemes realizing general access structure. In: Proceedings of IEEE Global Telecommunication Conference, pp. 99\u2013102. IEEE Press, New Jersey (1987)"},{"key":"85_CR4","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Proceedings of Crypto\u201988, Lecture Notes in Computer Science, pp. 213\u2013222. Springer-Verlag, Berlin (1989)","DOI":"10.1007\/0-387-34799-2_3"},{"key":"85_CR5","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/49.223873","volume":"5","author":"C.C. Chang","year":"1993","unstructured":"Chang, C.C., Lee H.C.: A new generalized group-oriented cryptoscheme without trusted centers. IEEE J. Select. Areas Commun. 5, 725\u2013729 (1993)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"85_CR6","doi-asserted-by":"crossref","first-page":"1170","DOI":"10.1016\/S0140-3664(98)00191-1","volume":"13","author":"R.J. Hwang","year":"1998","unstructured":"Hwang R.J., Chang C.C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 13, 1170\u20131176 (1998)","journal-title":"Comput. Commun."},{"key":"85_CR7","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/S0140-3664(99)00041-9","volume":"8","author":"K.J. Tan","year":"1999","unstructured":"Tan K.J., Zhu H.W.: General secret sharing scheme. Comput. Commun. 8, 755\u2013757 (1999)","journal-title":"Comput. Commun."},{"key":"85_CR8","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1016\/j.csi.2004.01.002","volume":"5","author":"S.J. Wang","year":"2004","unstructured":"Wang S.J.: Direct construction of a secret in generalized group-oriented cryptography. Comput. Stand. Interf. 5, 455\u2013460 (2004)","journal-title":"Comput. Stand. Interf."},{"key":"85_CR9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1360\/crad20060106","volume":"1","author":"L.J. Pang","year":"2006","unstructured":"Pang L.J., Jiang Z.T., Wang Y.M.: A multi-secret sharing scheme based on the general access structure. J. Comput. Res. Dev. 1, 33\u201338 (2006)","journal-title":"J. Comput. Res. Dev."},{"key":"85_CR10","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1007\/BF02944759","volume":"4","author":"Y.B. Guo","year":"2004","unstructured":"Guo Y.B., Ma J.F.: Practical secret sharing scheme realizing generalized adversary structure. J. Comput. Sci. Technol. 4, 564\u2013569 (2004)","journal-title":"J. Comput. Sci. Technol."},{"key":"85_CR11","unstructured":"Sun, H.M., Shieh, S.P.: Secret sharing in graph-based prohibited structures. In: Proceedings of IEEE INFOCOM\u201997, pp. 718\u2013724. IEEE Press, Japan (1997)"},{"key":"85_CR12","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/0898-1221(96)00022-3","volume":"7","author":"H.M. Sun","year":"1996","unstructured":"Sun H.M., Shieh S.P.: An efficient construction of perfect secret sharing for graph-based structures. J. Comput. Math. Appl. 7, 129\u2013135 (1996)","journal-title":"J. Comput. Math. Appl."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0085-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0085-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0085-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T11:05:04Z","timestamp":1589886304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0085-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,9]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0085-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,9]]}}}