{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T14:16:20Z","timestamp":1770992180988,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2000,7,1]],"date-time":"2000-07-01T00:00:00Z","timestamp":962409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,17]],"date-time":"2013-07-17T00:00:00Z","timestamp":1374019200000},"content-version":"vor","delay-in-days":4764,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2000,7]]},"DOI":"10.1016\/s0304-3975(98)00263-1","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T14:07:20Z","timestamp":1027606040000},"page":"363-389","source":"Crossref","is-referenced-by-count":50,"title":["Secure distributed storage and retrieval"],"prefix":"10.1016","volume":"243","author":[{"given":"Juan A.","family":"Garay","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Gennaro","sequence":"additional","affiliation":[]},{"given":"Charanjit","family":"Jutla","sequence":"additional","affiliation":[]},{"given":"Tal","family":"Rabin","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0304-3975(98)00263-1_BIB1","series-title":"Theory and Practice of Error Control Codes","author":"Blahut","year":"1984"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB2","series-title":"Cryptography and Coding","first-page":"241","article-title":"Digital multisignatures","author":"Boyd","year":"1989"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB3","first-page":"425","article-title":"Maintaining security in the presence of transient faults","volume":"vol. 839","author":"Canetti","year":"1994"},{"issue":"4","key":"10.1016\/S0304-3975(98)00263-1_BIB4","first-page":"532","article-title":"Efficient and secure multiparty generation of digital signatures based on discrete logarithms","volume":"E76-A","author":"Cerecedo","year":"1993","journal-title":"IEICE Trans. Fundamentals"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB5","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind signatures for untraceable payments, in: Advances in Cryptology \u2013 Crypto \u201982, in: D. Chaum, R. Rivest and A. Sherman (eds.), Plenum, New York, 1983. pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"1","key":"10.1016\/S0304-3975(98)00263-1_BIB6","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1147\/sj.371.0042","article-title":"A security architecture for the internet protocol","volume":"37","author":"Chen","year":"1998","journal-title":"IBM Systems J."},{"key":"10.1016\/S0304-3975(98)00263-1_BIB7","series-title":"Proc. 26th Annu. Symp. on the Foundations of Computer Science","first-page":"383","article-title":"Verifiable secret sharing and achieving simultaneity in the presence of faults","author":"Chor","year":"1985"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB8","series-title":"Cryptography and Coding","first-page":"189","article-title":"Public-key cryptography and re-usable shared secrets","author":"Croft","year":"1989"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB9","series-title":"Proc. 26th Annu. Symp. on the Theory of Computing","first-page":"522","article-title":"How to share a function securely","author":"De Santis","year":"1994"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB10","first-page":"457","article-title":"Shared generation of authenticators and signatures","volume":"vol. 576","author":"Desmedt","year":"1991"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB11","first-page":"120","article-title":"Society and group oriented cryptography","volume":"vol. 293","author":"Desmedt","year":"1987"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB12","first-page":"307","article-title":"Threshold cryptosystems","volume":"vol. 435","author":"Desmedt","year":"1989"},{"issue":"4","key":"10.1016\/S0304-3975(98)00263-1_BIB13","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1002\/ett.4460050407","article-title":"Threshold cryptography","volume":"5","author":"Desmedt","year":"1994","journal-title":"Eur. Trans. Telecom."},{"key":"10.1016\/S0304-3975(98)00263-1_BIB14","first-page":"384","article-title":"Optimal resilience proactive public-key cryptosystems","author":"Frankel","year":"1997"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB15","series-title":"Proc. 28th Annu. Symp. on The Theory of Computing","first-page":"499","article-title":"Witness-based cryptographic program checking and robust function sharing","author":"Frankel","year":"1996"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB16","first-page":"440","article-title":"Proactive RSA","volume":"vol. 1294","author":"Frankel","year":"1997"},{"issue":"4","key":"10.1016\/S0304-3975(98)00263-1_BIB17","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB18","first-page":"275","article-title":"Secure distributed storage and retrieval","volume":"vol. 1320","author":"Garay","year":"1997"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB19","first-page":"157","article-title":"Robust and efficient sharing of RSA functions","volume":"vol. 1109","author":"Gennaro","year":"1996"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB20","first-page":"354","article-title":"Robust threshold DSS signatures","volume":"vol. 1070","author":"Gennaro","year":"1996"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB21","doi-asserted-by":"crossref","unstructured":"R. Gennaro, M. Rabin, T. Rabin, Simplified vss and fast-track multiparty computations with applications to threshold cryptography, Manuscript, 1997.","DOI":"10.1145\/277697.277716"},{"issue":"2","key":"10.1016\/S0304-3975(98)00263-1_BIB22","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"J. Comput. System Sci."},{"issue":"2","key":"10.1016\/S0304-3975(98)00263-1_BIB23","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","article-title":"A digital signature scheme secure against adaptive chosen-message attacks","volume":"17","author":"Goldwasser","year":"1988","journal-title":"SIAM J. Comput."},{"issue":"5","key":"10.1016\/S0304-3975(98)00263-1_BIB24","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","article-title":"Group oriented (t, n) digital signature scheme","volume":"141","author":"Harn","year":"1994","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"key":"10.1016\/S0304-3975(98)00263-1_BIB25","doi-asserted-by":"crossref","unstructured":"A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung, Proactive public key and signature systems, in: ACM Conf. on Computers and Communication Security, 1997.","DOI":"10.1145\/266420.266442"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB26","first-page":"339","article-title":"Proactive secret sharing, or: how to cope with perpetual leakage","volume":"vol. 963","author":"Herzberg","year":"1995"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB27","unstructured":"K. Hickman, Secure Socket Library, Netscape Communications Corp. <http:\/\/www.mcom.com\/info \/SSL.html."},{"key":"10.1016\/S0304-3975(98)00263-1_BIB28","series-title":"Proc. 13th ACM Symp. on Principles of Distributed Computation","first-page":"207","article-title":"Distributed fingerprints and secure information dispersal","author":"Krawczyk","year":"1993"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB29","first-page":"136","article-title":"Secret sharing made short","volume":"vol. 773","author":"Krawczyk","year":"1993"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB30","series-title":"Proc. 10th ACM Symp. on Principles of Distributed Computation","first-page":"51","article-title":"How to withstand mobile virus attacks","author":"Ostrovsky","year":"1991"},{"issue":"1","key":"10.1016\/S0304-3975(98)00263-1_BIB31","first-page":"86","article-title":"New ElGamal type threshold digital signature scheme","volume":"E79-A","author":"Park","year":"1996","journal-title":"IEICE Trans. Fundamentals"},{"issue":"2","key":"10.1016\/S0304-3975(98)00263-1_BIB32","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/62044.62050","article-title":"Efficient dispersal of information for security, load balancing, and fault tolerance","volume":"36","author":"Rabin","year":"1989","journal-title":"J. ACM"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB33","first-page":"89","article-title":"A simplified approach to threshold and proactive RSA","volume":"vol. 1462","author":"Rabin","year":"1998"},{"issue":"2","key":"10.1016\/S0304-3975(98)00263-1_BIB34","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/S0304-3975(98)00263-1_BIB35","first-page":"612","volume":"22","author":"Shamir","year":"1979","journal-title":"How to share a secret, Comm. ACM"}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397598002631?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397598002631?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T23:52:18Z","timestamp":1578527538000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397598002631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,7]]},"references-count":35,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2000,7]]}},"alternative-id":["S0304397598002631"],"URL":"https:\/\/doi.org\/10.1016\/s0304-3975(98)00263-1","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2000,7]]}}}