{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:14:03Z","timestamp":1770340443568,"version":"3.49.0"},"reference-count":18,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1080\/01611194.2023.2175185","type":"journal-article","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T06:48:56Z","timestamp":1681886936000},"page":"291-304","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis and improvement of Q. Peng et\u00a0al.\u2019s PVSS scheme"],"prefix":"10.1080","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-0314","authenticated-orcid":false,"given":"Anindya Kumar","family":"Biswas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9948-6041","authenticated-orcid":false,"given":"Mou","family":"Dasgupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1920-4172","authenticated-orcid":false,"given":"Sangram","family":"Ray","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,4,18]]},"reference":[{"key":"e_1_3_1_2_1","doi-asserted-by":"crossref","unstructured":"Blakley G. R. 1979. Safeguarding cryptographic keys. In Proceedings of the AFIPS \u201979 National Computer Conference 25-28 February 1979 California vol. 48 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_1_3_1","unstructured":"Chor B. S. Goldwasser S. Micali and B. Awerbuch. 1985. Verifiable secret sharing and achieving simultaneity in presence of faults. Proceedings of 26th IEEE Symposium on FOCS SFCS \u201985 United States Portland OR USA 21\/10\/85 \u2192 23\/10\/85 383\u201395."},{"key":"e_1_3_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880975"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.08.046"},{"issue":"6","key":"e_1_3_1_7_1","first-page":"1192","article-title":"A publicly verifiable secret sharing scheme based on multilinear Diffie-Hellman assumption","volume":"18","author":"Peng Q.","year":"2016","unstructured":"Peng, Q., and Y. Tian. 2016a. A publicly verifiable secret sharing scheme based on multilinear Diffie-Hellman assumption. Journal of Network Security 18 (6):1192\u2013200.","journal-title":"Journal of Network Security"},{"key":"e_1_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1768"},{"key":"e_1_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_10"},{"key":"e_1_3_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_17"},{"issue":"3","key":"e_1_3_1_12_1","first-page":"142","article-title":"Publicly verifiable secret sharing schemes using bilinear pairing","volume":"14","author":"Tian Y.","year":"2012","unstructured":"Tian, Y., C. Peng, and J. Ma. 2012. Publicly verifiable secret sharing schemes using bilinear pairing. Journal of Network Security 14 (3):142\u20138.","journal-title":"Journal of Network Security"},{"key":"e_1_3_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252871"},{"issue":"3","key":"e_1_3_1_14_1","first-page":"142","article-title":"A pairing-based publicly verifiable secret sharing scheme","volume":"14","author":"Wu T.","year":"1911","unstructured":"Wu, T., and Y. Tseng. 1911. A pairing-based publicly verifiable secret sharing scheme. Journal of Systems Science and Complexity 14 (3):142\u20138.","journal-title":"Journal of Systems Science and Complexity"},{"issue":"5","key":"e_1_3_1_15_1","first-page":"809","article-title":"Verifiable secret sharing based on Micali-Rabin\u2019s random vector representations technique","volume":"22","author":"Yang H.","year":"2020","unstructured":"Yang, H., and Y. Tian. 2020. Verifiable secret sharing based on Micali-Rabin\u2019s random vector representations technique. Journal of Network Security 22 (5):809\u201314.","journal-title":"Journal of Network Security"},{"key":"e_1_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0437"},{"key":"e_1_3_1_17_1","first-page":"91","article-title":"A fast publicly verifiable secret sharing scheme using non-homogeneous linear recursions","volume":"12","author":"Zaghian A.","year":"2020","unstructured":"Zaghian, A., and B. Bagherpur. 2020. A fast publicly verifiable secret sharing scheme using non-homogeneous linear recursions. Information Security 12:91\u20139.","journal-title":"Information Security"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0026"},{"key":"e_1_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.013"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2023.2175185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T06:09:46Z","timestamp":1718863786000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2023.2175185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,18]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7,3]]}},"alternative-id":["10.1080\/01611194.2023.2175185"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2023.2175185","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,18]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}