{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T00:41:45Z","timestamp":1777423305554,"version":"3.51.4"},"reference-count":16,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":3730,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Discrete Applied Mathematics"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0166-218x(02)00448-1","type":"journal-article","created":{"date-parts":[[2003,5,12]],"date-time":"2003-05-12T23:10:20Z","timestamp":1052781020000},"page":"239-249","source":"Crossref","is-referenced-by-count":28,"title":["Generation of key predistribution schemes using secret sharing schemes"],"prefix":"10.1016","volume":"128","author":[{"given":"Germ\u00e1n","family":"S\u00e1ez","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0166-218X(02)00448-1_BIB1","doi-asserted-by":"crossref","unstructured":"G.R. Blakley, Safeguarding cryptographic keys, in: AFIPS Conference Proceedings, Vol. 48, 1979, pp. 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB2","doi-asserted-by":"crossref","unstructured":"R. Blom, An optimal class of symmetric key generation systems, in: Advances in Cryptology EUROCRYPT\u201984, Lecture Notes in Computer Science, Vol. 209, T. Beth, N. Cot, I. Ingermarsson (Eds.) Springer, Berlin, 1984, pp. 335\u2013338.","DOI":"10.1007\/3-540-39757-4_22"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB3","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. Cresti, Space requirements for broadcast encryption, in: Advances in Cryptology EUROCRYPT\u201994, Lecture Notes in Computer Science, Vol. 950, A. De Sentas (Ed.) Springer, Berlin, 1995, pp. 287\u2013298.","DOI":"10.1007\/BFb0053444"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB4","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung, Perfectly secure key distribution for dynamic conferences, in: Advances in Cryptology CRYPT0\u201992, Lecture Notes in Computer Science, Vol. 740, E.F. Brickell (Ed.) Springer, Berlin, 1993, pp. 471\u2013486.","DOI":"10.1007\/3-540-48071-4_33"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB5","first-page":"105","article-title":"Some ideal secret sharing schemes","volume":"9","author":"Brickell","year":"1989","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"10.1016\/S0166-218X(02)00448-1_BIB6","series-title":"Elements of Information Theory","author":"Cover","year":"1991"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB7","doi-asserted-by":"crossref","unstructured":"A. Fiat, M. Naor, Broadcast encryption, in: Advances in Cryptology CRYPTO\u201993, Lecture Notes in Computer Science, Vol. 773, D.R. Stinson (Ed.) Springer, Berlin, 1994, pp. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB8","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF01388562","article-title":"Geometric secret sharing schemes and their duals","volume":"4","author":"Jackson","year":"1994","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB9","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s001459900014","article-title":"Ideal secret sharing schemes with multiple secrets","volume":"9","author":"Jackson","year":"1996","journal-title":"J. Cryptology"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","article-title":"On secret sharing systems","volume":"29","author":"Karnin","year":"1983","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB11","doi-asserted-by":"crossref","unstructured":"T. Matsumoto, H. Imai, On the key predistribution system: a practical solution to the key distribution problem, in: Advances in Cryptology CRYPTO\u201987, Lecture Notes in Computer Science, Vol. 293, Springer, Berlin, 1987, pp. 185\u2013193.","DOI":"10.1007\/3-540-48184-2_14"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB12","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology, NIST FIPS PUB 197, \u2018Advanced Encryption algorithm (AES)\u2019, U.S. Department of Commerce, November 26, 2001. http:\/\/csrc.nist.gov\/encryption\/aes\/.","DOI":"10.6028\/NIST.FIPS.197"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB13","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB14","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","article-title":"An explication of secret sharing schemes","volume":"2","author":"Stinson","year":"1992","journal-title":"Designs Codes Cryptography"},{"key":"10.1016\/S0166-218X(02)00448-1_BIB15","series-title":"Cryptography: Theory and Practice","author":"Stinson","year":"1995"},{"issue":"3","key":"10.1016\/S0166-218X(02)00448-1_BIB16","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1008268610932","article-title":"On some methods for unconditionally secure key distribution and broadcast encryption","volume":"12","author":"Stinson","year":"1997","journal-title":"Designs Codes Cryptography"}],"container-title":["Discrete Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X02004481?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0166218X02004481?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T16:56:59Z","timestamp":1584464219000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0166218X02004481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S0166218X02004481"],"URL":"https:\/\/doi.org\/10.1016\/s0166-218x(02)00448-1","relation":{},"ISSN":["0166-218X"],"issn-type":[{"value":"0166-218X","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}