{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:13Z","timestamp":1740122653495,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572454"],"award-info":[{"award-number":["61572454"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07647-x","type":"journal-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T08:04:38Z","timestamp":1596096278000},"page":"1635-1650","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel and Secure Secret Sharing Algorithm Applied to Insecure Networks"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7616-9791","authenticated-orcid":false,"given":"Keju","family":"Meng","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"issue":"2","key":"7647_CR1","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1109\/TIFS.2017.2757454","volume":"13","author":"Z Ahmadian","year":"2018","unstructured":"Ahmadian, Z., & Jamshidpour, S. (2018). Linear subspace cryptanalysis of harn\u2019s secret sharing-based group authentication scheme. IEEE Transactions on Information Forensics and Security, 13(2), 502\u2013510.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"7647_CR2","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth, C., & Bloom, J. (1983). A modular approach to key safeguarding. IEEE transactions on information theory, 29(2), 208\u2013210.","journal-title":"IEEE transactions on information theory"},{"issue":"2","key":"7647_CR3","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1109\/TIT.2004.840857","volume":"51","author":"SG Barwick","year":"2005","unstructured":"Barwick, S. G., Jackson, W.-A., & Martin, K. M. (2005). Updating the parameters of a threshold scheme by minimal broadcast. IEEE Transactions on Information Theory, 51(2), 620\u2013633.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"7647_CR4","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1109\/TIFS.2014.2384393","volume":"10","author":"M Fuyou","year":"2015","unstructured":"Fuyou, M., Yan, X., Xingfu, W., & Badawy, M. (2015). Randomized component and its application to ($$t$$, $$m$$, $$n$$)-group oriented secret sharing. IEEE Transactions on Information Forensics and Security, 10(5), 889\u2013899.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"9","key":"7647_CR5","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1109\/TC.2012.251","volume":"62","author":"L Harn","year":"2013","unstructured":"Harn, L. (2013). Group authentication. IEEE Transactions on computers, 62(9), 1893\u20131898.","journal-title":"Group authentication. IEEE Transactions on computers"},{"issue":"11","key":"7647_CR6","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1016\/j.ipl.2015.06.014","volume":"115","author":"L Harn","year":"2015","unstructured":"Harn, L., & Hsu, C.-F. (2015). Dynamic threshold secret reconstruction and its application to the threshold cryptography. Information Processing Letters, 115(11), 851\u2013857.","journal-title":"Information Processing Letters"},{"issue":"1","key":"7647_CR7","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s11277-014-2208-y","volume":"82","author":"C-F Hsu","year":"2015","unstructured":"Hsu, C.-F., Wu, S., & Harn, L. (2015). New results on ideal multipartite secret sharing and its applications to group communications. Wireless Personal Communications, 82(1), 283\u2013292.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7647_CR8","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/s11277-013-1298-2","volume":"74","author":"C Hsu","year":"2014","unstructured":"Hsu, C., Zeng, B., Cui, G., & Chen, L. (2014). A new secure authenticated group key transfer protocol. Wireless personal communications, 74(2), 457\u2013467.","journal-title":"Wireless personal communications"},{"key":"7647_CR9","unstructured":"Jamshidpour, S., & Ahmadian, Z. (2017). Security analysis of a dynamic threshold secret sharing scheme using linear subspace method. Cryptology ePrint Archive, Report 2017\/1099 ."},{"key":"7647_CR10","doi-asserted-by":"crossref","unstructured":"Khorasgani, H.A., Asaad, S., Eghlidos, T., & Aref, M. (2014). A lattice-based threshold secret sharing scheme. In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on, pp. 173\u2013179. IEE.","DOI":"10.1109\/ISCISC.2014.6994043"},{"issue":"7","key":"7647_CR11","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1002\/dac.2760","volume":"28","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Harn, L., & Chang, C.-C. (2015). A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. International Journal of Communication Systems, 28(7), 1282\u20131292.","journal-title":"International Journal of Communication Systems"},{"key":"7647_CR12","doi-asserted-by":"crossref","unstructured":"Martin, K.M., Pieprzyk, J., Safavi-Naini, R., & Wang, H. (1999). Changing thresholds in the absence of secure channels. In Australasian Conference on Information Security and Privacy, pp. 177\u2013191. Springer.","DOI":"10.1007\/3-540-48970-3_15"},{"issue":"9","key":"7647_CR13","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1145\/358746.358762","volume":"24","author":"RJ McEliece","year":"1981","unstructured":"McEliece, R. J., & Sarwate, D. V. (1981). On sharing secrets and reed-Solomon codes. Communications of the ACM, 24(9), 583\u2013584.","journal-title":"Communications of the ACM"},{"key":"7647_CR14","doi-asserted-by":"crossref","first-page":"105928","DOI":"10.1016\/j.ipl.2020.105928","volume":"157","author":"K Meng","year":"2020","unstructured":"Meng, K., Miao, F., Huang, W., & Xiong, Y. (2020). Threshold changeable secret sharing with secure secret reconstruction. Information Processing Letters, 157, 105928.","journal-title":"Information Processing Letters"},{"key":"7647_CR15","doi-asserted-by":"crossref","unstructured":"Mignotte, M. (1982). How to share a secret. In Workshop on Cryptography, pp. 371\u2013375. Springer.","DOI":"10.1007\/3-540-39466-4_27"},{"key":"7647_CR16","unstructured":"Nakamura, W., Yamamoto, H., & Chan, T. (2016). A ramp threshold secret sharing scheme against cheating by substitution attacks. In Information Theory and Its Applications (ISITA), 2016 International Symposium on, pp. 340\u2013344. IEEE."},{"issue":"1","key":"7647_CR17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3934\/amc.2013.7.39","volume":"7","author":"M Nojoumian","year":"2013","unstructured":"Nojoumian, M., & Stinson, D. R. (2013). On dealer-free dynamic threshold schemes. Advances in Mathematics of Communications, 7(1), 39\u201356.","journal-title":"Advances in Mathematics of Communications"},{"issue":"7","key":"7647_CR18","doi-asserted-by":"crossref","first-page":"e4327","DOI":"10.1002\/dac.4327","volume":"33","author":"C Nykvist","year":"2020","unstructured":"Nykvist, C., Larsson, M., Sodhro, A. H., & Gurtov, A. (2020). A lightweight portable intrusion detection communication system for auditing applications. International Journal of Communication Systems, 33(7), e4327.","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"7647_CR19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1023\/A:1008378426278","volume":"16","author":"C Padro","year":"1999","unstructured":"Padro, C., S\u00e1ez, G., & Villar, J. L. (1999). Detection of cheaters in vector space secret sharing schemes. Designs, Codes and Cryptography, 16(1), 75\u201385.","journal-title":"Designs, Codes and Cryptography"},{"key":"7647_CR20","doi-asserted-by":"crossref","unstructured":"Patra, A, Choudhary, A., & Rangan, C.P. (2009). Efficient statistical asynchronous verifiable secret sharing with optimal resilience. In International Conference on Information Theoretic Security, pp. 74\u201392. Springer.","DOI":"10.1007\/978-3-642-14496-7_7"},{"key":"7647_CR21","doi-asserted-by":"crossref","unstructured":"Pirbhulal, S., Pombo, N., Felizardo, V., Garcia, N., Sodhro, A.H., & Mukhopadhyay, S.C. (2019). Towards machine learning enabled security framework for iot-based healthcare. In 2019 13th International Conference on Sensing Technology (ICST), pp. 1\u20136. IEEE.","DOI":"10.1109\/ICST46873.2019.9047745"},{"issue":"11","key":"7647_CR22","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"7647_CR23","first-page":"3383","volume":"11","author":"AH Sodhro","year":"2013","unstructured":"Sodhro, A. H., Li, Y., & Shah, M. A. (2013). Novel key storage and management solution for the security of wireless sensor networks. Indonesian Journal of Electrical Engineering and Computer Science, 11, 3383\u20133390.","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"4","key":"7647_CR24","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.ffa.2005.04.007","volume":"12","author":"R Steinfeld","year":"2006","unstructured":"Steinfeld, R., Pieprzyk, J., & Wang, H. (2006). Lattice-based threshold-changeability for standard crt secret-sharing schemes. Finite Fields and Their Applications, 12(4), 653\u2013680.","journal-title":"Finite Fields and Their Applications"},{"key":"7647_CR25","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Wang, H., & Pieprzyk, J. (2004). Lattice-based threshold-changeability for standard shamir secret-sharing schemes. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 170\u2013186. Springer.","DOI":"10.1007\/978-3-540-30539-2_13"},{"key":"7647_CR26","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.future.2019.07.068","volume":"102","author":"R Talat","year":"2020","unstructured":"Talat, R., Obaidat, M. S., Muzammal, M., Sodhro, A. H., Luo, Z., & Pirbhulal, S. (2020). A decentralised approach to privacy preserving trajectory mining. Future Generation Computer Systems, 102, 382\u2013392.","journal-title":"Future Generation Computer Systems"},{"key":"7647_CR27","doi-asserted-by":"crossref","unstructured":"Tompa, M., & Woll, H. (1986). How to share a secret with cheaters. In Conference on the Theory and Application of Cryptographic Techniques, pp. 261\u2013265. Springer.","DOI":"10.1007\/3-540-47721-7_20"},{"issue":"10","key":"7647_CR28","doi-asserted-by":"crossref","first-page":"e0165512","DOI":"10.1371\/journal.pone.0165512","volume":"11","author":"L Yuan","year":"2016","unstructured":"Yuan, L., Li, M., Guo, C., Choo, K.-K. R., & Ren, Y. (2016). Novel threshold changeable secret sharing schemes based on polynomial interpolation. PloS One, 11(10), e0165512.","journal-title":"PloS One"},{"key":"7647_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhang, L., Zhang, Q., & Tang, C. (2008). A secret sharing shuffling scheme based on polynomial. In Information and Automation, 2008. ICIA 2008. International Conference on, pp. 1746\u20131750. IEEE.","DOI":"10.1109\/ICINFA.2008.4608288"},{"key":"7647_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, X., & He, M. (2010). Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pp. 745\u2013752. IEEE.","DOI":"10.1109\/AINA.2010.56"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07647-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07647-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07647-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T23:43:07Z","timestamp":1627602187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07647-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7647"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07647-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"30 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}