{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T22:22:49Z","timestamp":1710195769440},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T00:00:00Z","timestamp":1474329600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National Key Basic Research Program of China","award":["2013CB834204","61571243 and 61171082"],"award-info":[{"award-number":["2013CB834204","61571243 and 61171082"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s12095-016-0205-6","type":"journal-article","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T01:32:31Z","timestamp":1474335151000},"page":"625-635","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secret sharing schemes for compartmented access structures"],"prefix":"10.1007","volume":"9","author":[{"given":"Xianfang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Can","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Fang-Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"205_CR1","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys, National Computer Conference, New York, Montvale, NJ, USA, vol. 48 of AFIPS Conference Proceedings (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"2","key":"205_CR2","first-page":"105","volume":"9","author":"EF Brickell","year":"1989","unstructured":"Brickell, E.F.: Some ideal secret sharing schemes. J. Combin. Math. Combin. Comput. 9(2), 105\u2013113 (1989)","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"205_CR3","first-page":"11","volume":"6639","author":"A Beimel","year":"2011","unstructured":"Beimel, A.: Secret-Sharing schemes: A survey. Proc. IWCC 2011, Qingdao, China LNCS 6639, 11\u201346 (2011)","journal-title":"Proc. IWCC 2011, Qingdao, China LNCS"},{"key":"205_CR4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume":"403","author":"J Benaloh","year":"1990","unstructured":"Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. Proc. Adv. Cryptol, LNCS 403, 27\u201335 (1990)","journal-title":"Proc. Adv. Cryptol, LNCS"},{"issue":"9","key":"205_CR5","first-page":"1023","volume":"3","author":"C Ding","year":"1997","unstructured":"Ding, C., Laihonen, T., Renvall, A.: Linear multi-secret sharing schemes and error-correcting codes. J. Univ. Comput. Sci. 3(9), 1023\u20131036 (1997)","journal-title":"J. Univ. Comput. Sci."},{"key":"205_CR6","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/S0304-3975(00)00207-3","volume":"246","author":"C Ding","year":"2000","unstructured":"Ding, C., Kohel, D., Ling, S.: Secret sharing with a class of ternary codes. Theor. Comput. Sci. 246, 285\u2013298 (2000)","journal-title":"Theor. Comput. Sci."},{"key":"205_CR7","doi-asserted-by":"crossref","unstructured":"Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Discrete Mathematics and Theoretical Computer Science, Lecture Notes in Computer Science 2731, 2003, pp 11\u201325. Springer Verlag (2003)","DOI":"10.1007\/3-540-45066-1_2"},{"issue":"1-2","key":"205_CR8","first-page":"65","volume":"71","author":"C Ding","year":"2006","unstructured":"Ding, C., Salomaa, A.: Secret sharing schemes with nice access structures. Fundam. Inf. - icae 71(1-2), 65\u201379 (2006)","journal-title":"Fundam. Inf. - icae"},{"issue":"3","key":"205_CR9","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1109\/TIT.2014.2300113","volume":"60","author":"O Farr\u00e0s","year":"2014","unstructured":"Farr\u00e0s, O., Padr\u00f3, C., Xing, C., Yang, A.: Natural generalizations of threshold secret sharing. IEEE Trans. Inf. Theory 60(3), 1652\u20131664 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"205_CR10","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/s00145-011-9101-6","volume":"25","author":"O Farr\u00e0s","year":"2012","unstructured":"Farr\u00e0s, O., Mart\u00ed-Farr\u00e9, J., Padr\u00f3, C.: Ideal multipartite secret sharing schemes. J. Cryptol. 25(3), 434\u2013463 (2012)","journal-title":"J. Cryptol."},{"issue":"1","key":"205_CR11","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/BF02620229","volume":"6","author":"M Ito","year":"1993","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. J. Cryptol. 6(1), 15\u201320 (1993)","journal-title":"J. Cryptol."},{"key":"205_CR12","doi-asserted-by":"crossref","unstructured":"Liu, J., Mesnager, S., Chen, L.: Secret Sharing Schemes with General Access Structures. http:\/\/eprint.iacr.org\/2015\/1139.pdf","DOI":"10.1007\/978-3-319-38898-4_20"},{"issue":"11","key":"205_CR13","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"205_CR14","doi-asserted-by":"crossref","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume":"403","author":"GJ Simmons","year":"1990","unstructured":"Simmons, G.J.: How to (really) share a secret. Proc. Adv. Cryptol, LNCS 403, 390\u2013448 (1990)","journal-title":"Proc. Adv. Cryptol, LNCS"},{"issue":"4","key":"205_CR15","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"DR Stinson","year":"1992","unstructured":"Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Cryptogr. 2(4), 357\u2013390 (1992)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"205_CR16","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s00145-008-9027-9","volume":"22","author":"T Tassa","year":"2009","unstructured":"Tassa, T., Dyn, N.: Multipartite secret sharing by bivariate interpolation. J. Cryptol. 22(2), 227\u2013258 (2009)","journal-title":"J. Cryptol."},{"issue":"2","key":"205_CR17","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s00145-006-0334-8","volume":"20","author":"T Tassa","year":"2007","unstructured":"Tassa, T.: Hierarchical threshold secret sharing. J. Cryptol. 20(2), 237\u2013264 (2007)","journal-title":"J. Cryptol."},{"issue":"7","key":"205_CR18","first-page":"1","volume":"58","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Wu, Q., W, D., et al.: Further ideal multipartite access structures from integer polymatroids. Sci. China Inf. Sci. 58(7), 1\u201313 (2015)","journal-title":"Sci. China Inf. Sci."},{"issue":"4","key":"205_CR19","doi-asserted-by":"crossref","first-page":"856","DOI":"10.1587\/transfun.E99.A.856","volume":"E99-A","author":"X Wang","year":"2016","unstructured":"Wang, X., Fu, F. -W., Guang, X.: Probabilistic secret sharing schemes for multipartite access structures. IEICE Trans. Fundam. E99-A(4), 856\u2013862 (2016)","journal-title":"IEICE Trans. Fundam."},{"key":"205_CR20","first-page":"136","volume":"7043","author":"Y Yu","year":"2011","unstructured":"Yu, Y., Wang, M.: A probabilistic secret sharing scheme for a compartmented access structure. Proc. ICICS\u2019 2011, Beijing, China LNCS 7043, 136\u2013142 (2011)","journal-title":"Proc. ICICS\u2019 2011, Beijing, China LNCS"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0205-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-016-0205-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-016-0205-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:41:24Z","timestamp":1568389284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-016-0205-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,20]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["205"],"URL":"https:\/\/doi.org\/10.1007\/s12095-016-0205-6","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,20]]}}}