{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T23:06:07Z","timestamp":1682636767803},"reference-count":14,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1016\/s0020-0190(99)00153-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T08:27:28Z","timestamp":1027585648000},"page":"169-175","source":"Crossref","is-referenced-by-count":5,"title":["Probability of shares in secret sharing schemes"],"prefix":"10.1016","volume":"72","author":[{"given":"C.","family":"Blundo","sequence":"first","affiliation":[]},{"given":"A.","family":"De Santis","sequence":"additional","affiliation":[]},{"given":"A.","family":"Giorgio Gaggia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0020-0190(99)00153-2_ID003","series-title":"Advances in Cryptology\u2014CRYPTO '88","first-page":"27","article-title":"Generalized secret sharing and monotone functions","volume":"403","author":"Benaloh","year":"1990"},{"key":"10.1016\/S0020-0190(99)00153-2_ID004","series-title":"Proc. AFIPS 1979 National Computer Conference","first-page":"313","article-title":"Safeguarding cryptographic keys","author":"Blakley","year":"1979"},{"key":"10.1016\/S0020-0190(99)00153-2_ID005","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S0020-0190(97)00194-4","article-title":"On secret sharing schemes","volume":"65","author":"Blundo","year":"1998","journal-title":"Inform. Process. Lett."},{"issue":"2","key":"10.1016\/S0020-0190(99)00153-2_ID006","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1006\/inco.1996.0095","article-title":"Randomness in distribution protocols","volume":"131","author":"Blundo","year":"1996","journal-title":"Inform. and Comput."},{"key":"10.1016\/S0020-0190(99)00153-2_ID007","series-title":"Advances in Cryptology\u2014Eurocrypt '94","first-page":"35","article-title":"On the dealer's randomness required in secret sharing schemes","volume":"950","author":"Blundo","year":"1995"},{"key":"10.1016\/S0020-0190(99)00153-2_ID008","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00196772","article-title":"On the classification of ideal secret sharing schemes","volume":"4","author":"Brickell","year":"1991","journal-title":"J. Cryptology"},{"issue":"3","key":"10.1016\/S0020-0190(99)00153-2_ID009","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02451112","article-title":"Improved bounds on the information rate of perfect secret sharing schemes","volume":"5","author":"Brickell","year":"1992","journal-title":"J. Cryptology"},{"key":"10.1016\/S0020-0190(99)00153-2_ID010","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF00198463","article-title":"On the size of shares for secret sharing schemes","volume":"6","author":"Capocelli","year":"1993","journal-title":"J. Cryptology"},{"key":"10.1016\/S0020-0190(99)00153-2_ID011","series-title":"Elements of Information Theory","author":"Cover","year":"1991"},{"key":"10.1016\/S0020-0190(99)00153-2_ID012","series-title":"Proc. of IEEE Global Telecommunication Conf. Globecom 87","first-page":"99","article-title":"Secret sharing scheme realizing general access structure","author":"Ito","year":"1987"},{"issue":"1","key":"10.1016\/S0020-0190(99)00153-2_ID013","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","article-title":"On secret sharing systems","volume":"IT-29","author":"Karnin","year":"1983","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"11","key":"10.1016\/S0020-0190(99)00153-2_ID014","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Comm. ACM"},{"key":"10.1016\/S0020-0190(99)00153-2_ID015","first-page":"215","article-title":"An introduction to shared secret and\/or shared control schemes and their application","volume":"68","author":"Simmons","year":"1989","journal-title":"Congr. Numer."},{"key":"10.1016\/S0020-0190(99)00153-2_ID016","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","article-title":"An explication of secret sharing schemes","volume":"2","author":"Stinson","year":"1992","journal-title":"Design, Codes and Cryptography"}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019099001532?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019099001532?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T12:20:37Z","timestamp":1556626837000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020019099001532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":14,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[1999,12]]}},"alternative-id":["S0020019099001532"],"URL":"https:\/\/doi.org\/10.1016\/s0020-0190(99)00153-2","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}