{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T14:33:02Z","timestamp":1764858782116,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994043","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:11:01Z","timestamp":1419977461000},"page":"173-179","source":"Crossref","is-referenced-by-count":14,"title":["A lattice-based threshold secret sharing scheme"],"prefix":"10.1109","author":[{"given":"Hamidreza Amini","family":"Khorasgani","sequence":"first","affiliation":[]},{"given":"Saba","family":"Asaad","sequence":"additional","affiliation":[]},{"given":"Taraneh","family":"Eghlidos","sequence":"additional","affiliation":[]},{"given":"Mohammadreza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579403"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.899541"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_14"},{"key":"12","first-page":"27","article-title":"A lwe-based secret sharing scheme","author":"georgescu","year":"2011","journal-title":"IJCA Special Issue on \"Network Security and Cryptography"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"2","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"Ntru: A ring-based public key cryptosystem","author":"hoffstein","year":"1998","journal-title":"Algorithmic Number Theory"},{"key":"1","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/BFb0052231","article-title":"Public-key cryptosystems from lattice reduction problems","author":"goldreich","year":"1997","journal-title":"Advances in Cryptology ? CRYPTO 97"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1145\/62212.62214","article-title":"Multiparty unconditionally secure protocols","author":"chaum","year":"1988","journal-title":"Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing ACM"},{"key":"6","first-page":"208","article-title":"A modular approach to key safeguarding","volume":"30","author":"asmuth","year":"1988","journal-title":"IEEE Transactions on Information Theory"},{"key":"5","article-title":"Safeguarding cryptographic keys","author":"blakeley","year":"1979","journal-title":"Proceedings of the National Computer Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"9","article-title":"An online public auction protocol protecting bidder privacy","author":"khanh quoc","year":"2000","journal-title":"Information Security and Privacy"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_10"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994043.pdf?arnumber=6994043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:54:40Z","timestamp":1498172080000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994043","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}