{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T07:25:11Z","timestamp":1649143511233},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T00:00:00Z","timestamp":1458864000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11334-016-0273-y","type":"journal-article","created":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T05:55:48Z","timestamp":1458885348000},"page":"215-225","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the use of secret sharing as a secure multi-use pad"],"prefix":"10.1007","volume":"12","author":[{"given":"Neil","family":"Buckley","sequence":"first","affiliation":[]},{"given":"Atulya K.","family":"Nagar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Arumugam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"273_CR1","doi-asserted-by":"crossref","unstructured":"Aldosary S, Howells GA (2012) robust multimodal biometric security system using the polynomial curve technique within Shamir\u2019s Secret Sharing algorithm. In: Proceedings of Third International Conference on Emerging Security Technologies, pp 66\u201369","DOI":"10.1109\/EST.2012.9"},{"key":"273_CR2","doi-asserted-by":"crossref","unstructured":"Alsolami F, Boult T (2014) CloudStash: using secret-sharing scheme to secure data, not keys, in multi-clouds. In: Proceedings of 11th International Conference on Information Technology: New Generations, pp 315\u2013320","DOI":"10.1109\/ITNG.2014.119"},{"key":"273_CR3","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"M Asmuth","year":"1983","unstructured":"Asmuth M, Bloom J (1983) A modular approach to key safeguarding. IEEE Trans Inform Theory 29:566\u2013584","journal-title":"IEEE Trans Inform Theory"},{"key":"273_CR4","first-page":"416","volume":"1099","author":"G Ateniese","year":"1996","unstructured":"Ateniese G, Blundo C, De Santis A (1996) Constructions and bounds for visual cryptography. Automata, Lang Program 1099:416\u2013428","journal-title":"Automata, Lang Program"},{"key":"273_CR5","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, pp 313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"key":"273_CR6","doi-asserted-by":"crossref","unstructured":"Buckley N, Nagar AK, Arumugam S (2014) Key-based steganographic textual secret sharing. In: Proceedings of third international conference on soft computing for problem solving, pp 25\u201334","DOI":"10.1007\/978-81-322-1771-8_3"},{"key":"273_CR7","unstructured":"Daemen J (2014) D-wave systems. http:\/\/www.dwavesys.com\/d-wave-two-system"},{"key":"273_CR8","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.3390\/e17031135","volume":"17","author":"S Dai","year":"2015","unstructured":"Dai S, Guo D (2015) Comparing security notions of secret sharing schemes. MDPI Entropy 17:1135\u20131145","journal-title":"MDPI Entropy"},{"key":"273_CR9","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1016\/j.adhoc.2012.03.011","volume":"10","author":"S Dolev","year":"2012","unstructured":"Dolev S, Lahiani L, Yung M (2012) Secret swarm unit: eeactive k-secret sharing. Ad Hoc Netw 10:1291\u20131305","journal-title":"Ad Hoc Netw"},{"key":"273_CR10","doi-asserted-by":"crossref","unstructured":"Ge L, Tang S (2008) Sharing multi-secret based on circle properties. In: Proceedings of International conference on computational intelligence and security, pp 340\u2013344","DOI":"10.1109\/CIS.2008.176"},{"key":"273_CR11","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1364\/OL.12.000377","volume":"12","author":"O Kafri","year":"1987","unstructured":"Kafri O, Keren E (1987) Image encryption by multiple random grids. Opt Lett 12:377\u2013379","journal-title":"Opt Lett"},{"key":"273_CR12","doi-asserted-by":"crossref","unstructured":"Kaya K, Selcuk AA (2007) Threshold cryptography based on Asmuth-Bloom secret sharing 1-20","DOI":"10.1016\/j.ins.2007.04.008"},{"key":"273_CR13","first-page":"419","volume-title":"Visual Cryptography and Secret Image Sharing","author":"R Kikuchi","year":"2013","unstructured":"Kikuchi R, Chida K, Ikarashi D, Hamada K, Takahashi K (2013) Secret sharing schemes with conversion protocol to achieve short share-size and extendibility to multiparty computation. In: Boyd C, Simpson L (eds) Visual Cryptography and Secret Image Sharing. Springer-Verlag, Publisher, pp 419\u2013434"},{"key":"273_CR14","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/00207166808803030","volume":"2","author":"AN Kolmogorov","year":"1968","unstructured":"Kolmogorov AN (1968) Three approaches to the quantitative definition of information. Int J Comput Math 2:157\u2013168","journal-title":"Int J Comput Math"},{"key":"273_CR15","unstructured":"Micka P (2008) http:\/\/en.algoritmy.net\/article\/40379\/Letter-frequency-English"},{"key":"273_CR16","unstructured":"Mohsen T (2008) SMEmail: a new protocol for the secure E-mail in mobile environments. In: Proceedings of the Australian telecommunications networks and applications conference (ATNAC\u201908), pp 39\u201344"},{"key":"273_CR17","doi-asserted-by":"crossref","unstructured":"Muhil M, Krishna UH, Kumar RK, Mary Anita EA (2015) Securing multi-cloud using secret sharing algorithm. In: Proceedings of 2nd international symposium on big data and cloud computing (ISBCC\u201915), pp 421\u2013426","DOI":"10.1016\/j.procs.2015.04.011"},{"key":"273_CR18","unstructured":"Naor M, Shamir A (1994) Visual cryptography. In: Proceedings of EUROCRYPT, pp 1\u201312"},{"key":"273_CR19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120\u2013126","journal-title":"Commun ACM"},{"key":"273_CR20","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"key":"273_CR21","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.jss.2010.11.928","volume":"84","author":"M Ulutas","year":"2011","unstructured":"Ulutas M, Ulutas G, Nabiyev VV (2011) Medical image security and EPR hiding using Shamir\u2019s secret sharing scheme. J Syst Softw 84:341\u2013353","journal-title":"J Syst Softw"},{"key":"273_CR22","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1016\/j.sigpro.2012.11.014","volume":"93","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93:977\u2013995","journal-title":"Signal Process"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-016-0273-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-016-0273-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-016-0273-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T20:05:28Z","timestamp":1567713928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-016-0273-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["273"],"URL":"https:\/\/doi.org\/10.1007\/s11334-016-0273-y","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,25]]}}}