{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T20:53:28Z","timestamp":1648587208580},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Jrl Syst Sci &amp; Complex"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s11424-007-9044-z","type":"journal-article","created":{"date-parts":[[2007,11,5]],"date-time":"2007-11-05T13:25:09Z","timestamp":1194269109000},"page":"481-485","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic and Verifiable Secret Sharing Among Weighted Participants"],"prefix":"10.1007","volume":"20","author":[{"given":"Yanshuo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhuojun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9044_CR1","doi-asserted-by":"crossref","unstructured":"G. R. Blakey, Safeguarding cryptographic keys, Proc. of the 1979 AFIPS National Computer Conference, AFIPS Press, Montvale, 1979, 48: 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"11","key":"9044_CR2","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, E. W. Chionh, and R. N. Goldman, How to share a secret, Communication of ACM, 1979, 22(11): 612\u2013613.","journal-title":"Communication of ACM"},{"issue":"1","key":"9044_CR3","first-page":"102","volume":"46","author":"D.P. Huang","year":"2006","unstructured":"D. P. Huang, H. Y. Wang, L. S. Huang, Y. Q. Dai, Dynamic threshold secret sharing scheme(in Chinese), Journal of Tsinghua Univ. Sci. and Tech., 2006, 46(1): 102\u2013105.","journal-title":"Journal of Tsinghua Univ. Sci. and Tech."},{"issue":"2","key":"9044_CR4","first-page":"1","volume":"13","author":"M.S. Wang","year":"2005","unstructured":"M. S. Wang, Z. J. Liu, and Y. S. Zhang, Secret sharing among weighted participants, Journal of Beijing Electonic Science and Technology Institute, 2005, 13(2): 1\u20139.","journal-title":"Journal of Beijing Electonic Science and Technology Institute"},{"issue":"3","key":"9044_CR5","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1023\/A:1008200702849","volume":"14","author":"J. He","year":"1998","unstructured":"J. He and E. Dawson, Shared secret reconstruction, Designs, Codes, and Cryptography, 1998, 14(3): 221\u2013237.","journal-title":"Designs, Codes, and Cryptography"},{"key":"9044_CR6","doi-asserted-by":"crossref","unstructured":"John D. Lipson, Chinese remainder and interpolation algorithm, Proceedings of ACM Symposium on Symbolic and Algebraic Computation, ACM Press, 1971, 372\u2013391.","DOI":"10.1145\/800204.806309"},{"issue":"2","key":"9044_CR7","first-page":"133","volume":"1","author":"M. Tompa","year":"1988","unstructured":"M. Tompa and H. Woll, How to share a secet with cheaters, Journal of Cryptology, 1988, 1(2): 133\u2013139.","journal-title":"Journal of Cryptology"},{"issue":"1","key":"9044_CR8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1023\/A:1008378426278","volume":"16","author":"C. Padro","year":"1999","unstructured":"C. Padro, G. Saez, and J. Villar, Detection of Cheaters in vector space secret sharing schemes, Designs, Codes, and Cryptography, 1999, 16(1): 75\u201385.","journal-title":"Designs, Codes, and Cryptography"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-007-9044-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-007-9044-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-007-9044-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T21:10:38Z","timestamp":1588021838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-007-9044-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["9044"],"URL":"https:\/\/doi.org\/10.1007\/s11424-007-9044-z","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,12]]}}}