{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:05:48Z","timestamp":1754161548353,"version":"3.41.2"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1997,7,1]],"date-time":"1997-07-01T00:00:00Z","timestamp":867715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,7,1]],"date-time":"1997-07-01T00:00:00Z","timestamp":867715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Designs, Codes and Cryptography"],"published-print":{"date-parts":[[1997,7]]},"DOI":"10.1023\/a:1008242111272","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T08:47:34Z","timestamp":1040546854000},"page":"235-259","source":"Crossref","is-referenced-by-count":7,"title":["On the Dealer's Randomness Required in Secret Sharing Schemes"],"prefix":"10.1007","volume":"11","author":[{"given":"C.","family":"Blundo","sequence":"first","affiliation":[]},{"given":"A. Giorgio","family":"Gaggia","sequence":"additional","affiliation":[]},{"given":"D. R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"131333_CR1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0012-365X(76)90025-X","volume":"15","author":"R. Baker","year":"1976","unstructured":"R. Baker, Partitioning the Planes of AG\n\n                    2m\n                   (2) into 2-designs, Discrete Math., Vol. 15 (1976), pp. 205\u2013211.","journal-title":"Discrete Math."},{"key":"131333_CR2","doi-asserted-by":"crossref","unstructured":"J. C. Benaloh and J. Leichter, Generalized Secret Sharing and Monotone Functions, in Advances in Cryptology \u2014 Crypto '88, Lecture Notes in Computer Science, Vol. 403 (1990), pp. 27\u201335.","DOI":"10.1007\/0-387-34799-2_3"},{"key":"131333_CR3","volume-title":"Design Theory","author":"T. Beth","year":"1985","unstructured":"T. Beth, D. Jungnickel, and H. Lenz, Design Theory, Bibliographisches Institut, Zurich, 1985."},{"key":"131333_CR4","first-page":"313","volume":"48","author":"G. R. Blakley","year":"1979","unstructured":"G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings of AFIPS 1979 National Computer Conference, Vol. 48 (1979), pp. 313\u2013317.","journal-title":"Proceedings of AFIPS 1979 National Computer Conference"},{"key":"131333_CR5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/0304-3975(95)00065-8","volume":"154","author":"C. Blundo","year":"1996","unstructured":"C. Blundo, A. De Santis, L. Gargano, and U. Vaccaro, On the Information Rate of Secret Sharing Schemes, Theoretical Computer Science, Vol. 154 (1996), 283\u2013306.","journal-title":"Theoretical Computer Science"},{"key":"131333_CR6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/BF00204801","volume":"8","author":"C. Blundo","year":"1995","unstructured":"C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decompositions and Secret Sharing Schemes, Journal of Cryptology, Vol. 8 (1995), pp. 39\u201364.","journal-title":"Journal of Cryptology"},{"key":"131333_CR7","unstructured":"C. Blundo, A. De Santis, and U. Vaccaro, Randomness in Distribution Protocols, Technical Report, Universit\u00e0 di Salerno. [A preliminary version appeared in 21st International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science, Vol. 820 (dy1994), pp. 568\u2013579.]}"},{"key":"131333_CR8","doi-asserted-by":"crossref","unstructured":"C. Blundo, A De Santis, and U. Vaccaro, On Secret Sharing Schemes, Technical Report, Universit\u00e0 di Salerno, 1995.","DOI":"10.1007\/3-540-48658-5_17"},{"key":"131333_CR9","doi-asserted-by":"crossref","unstructured":"C. Blundo, A. Giorgio Gaggia, and D. R. Stinson, On the Dealer's Randomness Required in Secret Sharing Schemes, Advances in Cryptology \u2014 EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950 (1995), pp. 35\u201346.","DOI":"10.1007\/BFb0053422"},{"key":"131333_CR10","unstructured":"C. Blundo and D. R. Stinson, Anonymous Secret Sharing Schemes, submitted for publication."},{"key":"131333_CR11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/BF00196772","volume":"4","author":"E. F. Brickell","year":"1991","unstructured":"E. F. Brickell and D. M. Davenport, On the Classification of Ideal Secret Sharing Schemes, J. Cryptology, Vol. 4 (1991), pp. 123\u2013134.","journal-title":"J. Cryptology"},{"key":"131333_CR12","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02451112","volume":"5","author":"E. F. Brickell","year":"1992","unstructured":"E. F. Brickell and D. R. Stinson, Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes, J. Cryptology, Vol. 5 (1992), pp. 153\u2013166.","journal-title":"J. Cryptology"},{"key":"131333_CR13","doi-asserted-by":"crossref","unstructured":"R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, A Note on Secret Sharing Schemes, Sequences II: Methods in Communication, Security and Computer Science, Springer-Verlag, 1991, pp. 335\u2013344.","DOI":"10.1007\/978-1-4613-9323-8_25"},{"key":"131333_CR14","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/BF00198463","volume":"6","author":"R. M. Capocelli","year":"1993","unstructured":"R. M. Capocelli, A. De Santis, L. Gargano, and U. Vaccaro, On the Size of Shares for Secret Sharing Schemes, J. Cryptology, Vol. 6 (1993), pp. 157\u2013169.","journal-title":"J. Cryptology"},{"key":"131333_CR15","doi-asserted-by":"crossref","unstructured":"C. J. Colbourn and J. H. Dinitz, CRC Handbook on Combinatorial Designs, CRC Press, Inc, 1996.","DOI":"10.1201\/9781420049954"},{"key":"131333_CR16","unstructured":"T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons, 1991."},{"key":"131333_CR17","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, and A. Wigderson, How to Play any Mental Game, Proceedings of 19th ACM Symposium on Theory of Computing, 1987, pp. 218\u2013229.","DOI":"10.1145\/28395.28420"},{"key":"131333_CR18","doi-asserted-by":"crossref","first-page":"145","DOI":"10.4153\/CJM-1960-013-3","volume":"12","author":"H. Hanani","year":"1960","unstructured":"H. Hanani, On Quadruple Systems, Canad. J. Math., Vol. 12 (1960), pp. 145\u2013157.","journal-title":"Canad. J. Math."},{"key":"131333_CR19","doi-asserted-by":"crossref","first-page":"702","DOI":"10.4153\/CJM-1963-069-5","volume":"15","author":"H. Hanani","year":"1963","unstructured":"H. Hanani, On Some Tactical Configurations, Canad. J. Math., Vol. 15 (1963) pp. 702\u2013722.","journal-title":"Canad. J. Math."},{"key":"131333_CR20","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/0012-365X(72)90091-X","volume":"3","author":"H. Hanani","year":"1972","unstructured":"H. Hanani, D. K. Ray-Chaudhuri, and R. M. Wilson, On Resolvable Designs, Discrete Math., Vol. 3 (1972), pp. 343\u2013357.","journal-title":"Discrete Math."},{"key":"131333_CR21","doi-asserted-by":"crossref","unstructured":"R. Impagliazzo and D. Zuckerman, How to Recycle Random Bits, Proceedings 30th IEEE Symposium on Foundations of Computer Science, 1989, pp. 248\u2013255.","DOI":"10.1109\/SFCS.1989.63486"},{"key":"131333_CR22","unstructured":"M. Ito, A. Saito, and T. Nishizeki, Secret Sharing Scheme Realizing General Access Structure, Globecom '87, 1987, pp. 99\u2013102."},{"key":"131333_CR23","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E. D. Karnin","year":"1983","unstructured":"E. D. Karnin, J. W. Greene, and M. E. Hellman, On Secret Sharing Systems, IEEE Trans. Inform. Theory, Vol. 29 (1983), pp. 35\u201341.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"131333_CR24","unstructured":"D. E. Knuth and A.C. Yao, The Complexity of Nonuniform Random Number Generation, Algorithms and Complexity, Academic Press, 1976, pp. 357\u2013428."},{"key":"131333_CR25","doi-asserted-by":"crossref","unstructured":"D. Krizanc, D. Peleg, and E. Upfal, A Time-Randomness Tradeoff for Oblivious Routing, Proceedings 20th ACM Symposium on Theory of Computing, 1988, pp. 93\u2013102.","DOI":"10.1145\/62212.62221"},{"key":"131333_CR26","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/0097-3165(83)90052-3","volume":"34","author":"J. X. Lu","year":"1983","unstructured":"J. X. Lu, On Large Sets of Disjoint Steiner Triple Systems I, II and II, J. Combin. Theory A, Vol. 34 (1983), pp. 140\u2013182.","journal-title":"J. Combin. Theory A"},{"key":"131333_CR27","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/0097-3165(84)90066-9","volume":"37","author":"J. X. Lu","year":"1984","unstructured":"J. X. Lu, On Large Sets of Disjoint Steiner Triple Systems IV, V and VI, J. Combin. Theory A, Vol. 37 (1984), pp. 136\u2013192.","journal-title":"J. Combin. Theory A"},{"key":"131333_CR28","first-page":"65","volume":"14","author":"K. M. Martin","year":"1993","unstructured":"K. M. Martin, New Secret Sharing Schemes from Old, J. Combin. Math. Combin. Comput. Vol. 14 (1993), pp. 65\u201377.","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"131333_CR29","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/BF02451114","volume":"5","author":"S. J. Phillips","year":"1992","unstructured":"S. J. Phillips and N. C. Phillips, Strongly Ideal Secret Sharing Schemes, J. Cryptology, Vol. 5 (1992), pp. 185\u2013191.","journal-title":"J. Cryptology"},{"key":"131333_CR30","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1090\/pspum\/019\/9959","volume":"19","author":"D. K. Ray-Chaudhuri","year":"1971","unstructured":"D. K. Ray-Chaudhuri and R. M. Wilson, Solution of Kirkman's Schoolgirl Problem, Amer. Math. Soc. Proc. Symp. Pure Math., Vol. 19 (1971), pp. 187\u2013204.","journal-title":"Amer. Math. Soc. Proc. Symp. Pure Math."},{"key":"131333_CR31","first-page":"143","volume":"5","author":"P. J. Schellenberg","year":"1989","unstructured":"P. J. Schellenberg and D. R. Stinson, Threshold Schemes from Combinatorial Designs, J. Combin. Math. Combin. Comput., Vol. 5 (1989), pp. 143\u2013160.","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"131333_CR32","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to Share a Secret, Communications of the ACM, Vol. 22 (1979), pp. 612\u2013613.","journal-title":"Communications of the ACM"},{"key":"131333_CR33","doi-asserted-by":"crossref","unstructured":"G. J. Simmons, An Introduction to Shared Secret and\/or Shared Control Schemes and Their Application, Contemporary Cryptology, IEEE Press, 1991, pp. 441\u2013497.","DOI":"10.1007\/3-540-38424-3_16"},{"key":"131333_CR34","unstructured":"D. R. Stinson, New General Lower Bounds on the Information Rate of Secret Sharing Schemes, Advances in Cryptology-CRYPTO '92, Lecture Notes in Computer Science, Vol. 740 (1993), pp. 170\u2013184."},{"key":"131333_CR35","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BF00125203","volume":"2","author":"D. R. Stinson","year":"1992","unstructured":"D. R. Stinson, An Explication of Secret Sharing Schemes, Designs, Codes and Cryptography, Vol. 2 (1992), pp. 357\u2013390.","journal-title":"Designs, Codes and Cryptography"},{"key":"131333_CR36","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/18.272461","volume":"40","author":"D. R. Stinson","year":"1994","unstructured":"D. R. Stinson, Decomposition Constructions for Secret Sharing Schemes, IEEE Trans. Inform. Theory, Vol. 40 (1994), pp. 118\u2013125.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"131333_CR37","doi-asserted-by":"crossref","unstructured":"D. R. Stinson, Combinatorial Designs and Cryptography, Surveys in Combinatorics, 1993, Cambridge Univ. Press, 1993, pp. 257\u2013287.","DOI":"10.1017\/CBO9780511662089.010"},{"key":"131333_CR38","unstructured":"D. R. Stinson, Bibilography on Secret Sharing Schemes, available online at the following URL: http:\/\/bibd.unl.edu\/\u223cstinson\/ssbib.html"},{"key":"131333_CR39","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1137\/0401024","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson and A. Vanstone, A Combinatorial Approach to Threshold Schemes, SIAM J. Discrete. Math., Vol. 1 (1988), pp. 230\u2013236.","journal-title":"SIAM J. Discrete. Math."},{"key":"131333_CR40","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/0097-3165(91)90053-J","volume":"57","author":"L. Teirlinck","year":"1991","unstructured":"L. Teirlinck, A Completion of Lu's Determination of the Spectrum for Large Sets of Disjoint Steiner Triple Systems, J. Combin. Theory A, Vol. 57 (1991), pp. 302\u2013305.","journal-title":"J. Combin. Theory A"},{"key":"131333_CR41","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BF01388556","volume":"4","author":"L. Teirlinck","year":"1994","unstructured":"L. Teirlinck, Some New 2-resolvable Steiner Quadruple Systems, Designs, Codes and Cryptography, Vol, 4 (1994), pp. 5\u201310.","journal-title":"Designs, Codes and Cryptography"},{"key":"131333_CR42","unstructured":"L. Teirlinck, Large Sets of Disjoint Designs and Related Structures, Contemporary Design Theory: A Collection of Surveys, John Wiley & Sons, 1992 pp. 561\u2013592."},{"key":"131333_CR43","unstructured":"G. V. Zaicev, V. A. Zinoviev, and N. V. Semakov, Interrelation of Preparata and Hamming Codes and Extension of Hamming Codes to New Double Error-Correcting Codes, Proc. 2nd International Symp. Inform. Theory, 1973, pp. 257\u2013263."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008242111272.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008242111272\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008242111272.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T02:31:12Z","timestamp":1753756272000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008242111272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,7]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,7]]}},"alternative-id":["131333"],"URL":"https:\/\/doi.org\/10.1023\/a:1008242111272","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[1997,7]]}}}