{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T21:34:58Z","timestamp":1753738498762,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T00:00:00Z","timestamp":1667865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.U21A20428, No.12171134"],"award-info":[{"award-number":["No.U21A20428, No.12171134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s12095-022-00613-3","type":"journal-article","created":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T07:42:39Z","timestamp":1667893359000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A fully dynamic multi-secret sharing scheme with redundant authorization"],"prefix":"10.1007","volume":"16","author":[{"given":"Fulin","family":"Li","sequence":"first","affiliation":[]},{"given":"Hang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shixin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jiayun","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,8]]},"reference":[{"issue":"11","key":"613_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"613_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. IEEE Computer Society, 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"613_CR3","doi-asserted-by":"crossref","unstructured":"Yang. Y.H., Du. W.Z.: Secret Sharing Scheme Based on Chinese Remainder Theorem in Cloud Computing. In: 4th International Conference on Mechanical, Control and Computer Engineering, pp. 618\u2013621 (2019)","DOI":"10.1109\/ICMCCE48743.2019.00143"},{"key":"613_CR4","doi-asserted-by":"crossref","unstructured":"Chilwant, R.B., Sarvagod, T.S, Kumbhar, K. R., et al.: SISA: A secret-sharing scheme application for cloud environment. In: 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 638\u2013643 (2019)","DOI":"10.1109\/ICCES45898.2019.9002527"},{"key":"613_CR5","doi-asserted-by":"crossref","unstructured":"Raman, R.K., Varshney, L.R.: Distributed Storage Meets Secret Sharing on the Blockchain. In: 2018 Information Theory and Applications Workshop (ITA), pp. 1\u20136 (2018)","DOI":"10.1109\/ITA.2018.8503089"},{"key":"613_CR6","doi-asserted-by":"crossref","unstructured":"Chene, H.F., Wu, H.L., Chang, C.C., et al.: Light repository blockchain system with multisecret sharing for industrial big data. Security and Communication Networks (2019)","DOI":"10.1155\/2019\/9060756"},{"issue":"1","key":"613_CR7","first-page":"99","volume":"1987","author":"M Ito","year":"1987","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure, GLOBECOM Tokyo\u201987. IEEE\/IECE Global Telecommunications Conference 1987(1), 99\u2013102 (1987)","journal-title":"IEEE\/IECE Global Telecommunications Conference"},{"key":"613_CR8","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. Advances in Cryptology-CRYPTO \u201988, 18(1), 27\u201335 (1990)","DOI":"10.1007\/0-387-34799-2_3"},{"issue":"19","key":"613_CR9","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1049\/el:19941076","volume":"30","author":"J He","year":"1994","unstructured":"He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591\u20131592 (1994)","journal-title":"Electron. Lett."},{"key":"613_CR10","unstructured":"Geng, Y.J., Fan, X.H., Hong. F.: A new multi-secret scheme with multi-policy. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), pp. 1515-1517 (2007)"},{"key":"613_CR11","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2014.03.025","volume":"278","author":"J Shao","year":"2014","unstructured":"Shao, J.: Efficient verifiable multi-secret sharing scheme based on hash function. Inform. Sci. 278, 104\u2013109 (2014)","journal-title":"Inform. Sci."},{"key":"613_CR12","doi-asserted-by":"publisher","first-page":"20799","DOI":"10.1109\/ACCESS.2020.2968728","volume":"8","author":"N Wang","year":"2020","unstructured":"Wang, N., Cai, Y.Y., Fu, J.S., et al.: Information privacy protection based on verifiable (t, n)-threshold multi-secret sharing scheme. IEEE Access 8, 20799\u201320804 (2020)","journal-title":"IEEE Access"},{"key":"613_CR13","doi-asserted-by":"crossref","unstructured":"Cachin, C.: On-line secret sharing. In: Proceedings of Fifth IMA Conference on Cryptography and Coding, pp. 190\u2013198 (1995)","DOI":"10.1007\/3-540-60693-9_22"},{"issue":"12","key":"613_CR14","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1049\/el:19960692","volume":"32","author":"RGE Pinch","year":"1996","unstructured":"Pinch, R.G.E.: On line multiple secret sharing. Electron. Lett 32(12), 1087\u20131088 (1996)","journal-title":"Electron. Lett"},{"issue":"13","key":"613_CR15","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/S0140-3664(98)00191-1","volume":"21","author":"RJ Hwang","year":"1998","unstructured":"Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13), 1170\u20131176 (1998)","journal-title":"Comput. Commun."},{"key":"613_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2014.08.046","volume":"294","author":"S Mashhadi","year":"2015","unstructured":"Mashhadi, S., Dehkordi, M.H.: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inform. Sci. 294, 31\u201340 (2015)","journal-title":"Inform. Sci."},{"issue":"4","key":"613_CR17","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s11277-016-3619-8","volume":"92","author":"VP Binu","year":"2017","unstructured":"Binu, V.P., Sreekumar, A.: Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing. Wireless Pers. Commun. 92(4), 1531\u20131543 (2017)","journal-title":"Wireless Pers. Commun."},{"key":"613_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2019.04.061","volume":"496","author":"JT Yuan","year":"2019","unstructured":"Yuan, J.T., Li, L.X.: A fully dynamic secret sharing scheme. Inform. Sci. 496, 42\u201352 (2019)","journal-title":"Inform. Sci."},{"key":"613_CR19","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A.K., Maitra, P., et al.: A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication (IEMCOM), pp. 1374\u20131379 (2018)","DOI":"10.1109\/IEMCON.2018.8614998"},{"key":"613_CR20","doi-asserted-by":"crossref","unstructured":"Boneh, D.: The decision Diffie-Hellman problem, pp. 48\u201363. Algorithmic Number Theory. Third International Symposium, ANTS-III Proceedings (1998)","DOI":"10.1007\/BFb0054851"},{"issue":"3","key":"613_CR21","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/18.335890","volume":"40","author":"A Beimel","year":"1994","unstructured":"Beimel, A., Chor, B.: Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3), 786\u2013794 (1994)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00613-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00613-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00613-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,3]],"date-time":"2024-02-03T05:23:17Z","timestamp":1706937797000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00613-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,8]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["613"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00613-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2022,11,8]]},"assertion":[{"value":"7 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval and Consent to participate"}},{"value":"All authors have read and agreed to the published version of the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"In the scheme, many different notations are used. For convenience of reading, the notations and descriptions are summarized in Table .","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"List of Abbreviations"}}]}}