{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:43:16Z","timestamp":1730292196422,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8389094","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:25:44Z","timestamp":1529954744000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Hierarchy-based cheating detection and cheater identification in secret sharing schemes"],"prefix":"10.1109","author":[{"given":"Shalini","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Daya Sagar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.04.034"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4399-5"},{"key":"ref14","first-page":"190","article-title":"Publicly verifiable secret sharing","volume":"96","author":"stadler","year":"1996","journal-title":"Eurocrypt"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/BFb0054115","article-title":"A practical and provably secure scheme for publicly verifiable secret sharing and its applications","author":"fujisaki","year":"1998","journal-title":"Advances in CryptologyEUROCRYPT'98"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","article-title":"A simple publicly verifiable secret sharing scheme and its application to electronic voting","author":"schoenmakers","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"ref17","first-page":"142","article-title":"Publicly verifiable secret sharing schemes using bilinear pairings","volume":"14","author":"tian","year":"2012","journal-title":"IJ Network Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.469"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.040"},{"key":"ref28","first-page":"455","article-title":"Cryptosystem for secret sharing scheme with hierarchical groups","volume":"15","author":"basu","year":"2013","journal-title":"IJ Network Security"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","article-title":"Generalized secret sharing and monotone functions","author":"benaloh","year":"1990","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0334-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.4430720906"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252871"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3255"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2015.7375046"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9416-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9265-8"},{"key":"ref24","first-page":"18","article-title":"Disjunctive multi-level secret sharing","volume":"2008","author":"belenkiy","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_40"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.279"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/BFb0053748","article-title":"Secret sharing in multilevel and compartmented groups","author":"ghodosi","year":"1998","journal-title":"Information Security and Privacy"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","start":{"date-parts":[[2018,3,15]]},"location":"Dhanbad","end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08389094.pdf?arnumber=8389094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:15:19Z","timestamp":1643206519000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8389094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8389094","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}