{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:13Z","timestamp":1761621373422,"version":"3.37.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T00:00:00Z","timestamp":1522627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Industrial Science and Technology Project of Shaanxi Province","award":["2016GY-140"],"award-info":[{"award-number":["2016GY-140"]}]},{"name":"Science Research Project of the Key Laboratory of Shaanxi Provincial Department of Education","award":["15JS078"],"award-info":[{"award-number":["15JS078"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502384"],"award-info":[{"award-number":["61502384"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1086-5","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T00:57:58Z","timestamp":1522803478000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["(t,n) multi-secret sharing scheme extended from Harn-Hsu\u2019s scheme"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2989-256X","authenticated-orcid":false,"given":"Tong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xizheng","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Yanxiao","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,2]]},"reference":[{"key":"1086_CR1","unstructured":"GR Blakley, in AFIPS1979 national computer conference. Safeguarding cryptographic keys. vol.48, (1979), pp. 313\u2013317."},{"issue":"11","key":"1086_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"A Shamir, How to share a secret. Commun. ACM. 22(11), 612\u2013613 (1979).","journal-title":"Commun. ACM"},{"issue":"4","key":"1086_CR3","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1007\/s11424-013-2131-4","volume":"26","author":"CM Tang","year":"2013","unstructured":"CM Tang, SH Gao, CL Zhang, The optimal linear secret sharing scheme for any given access structure. J. Syst. Sci. Complex. 26(4), 634\u2013649 (2013).","journal-title":"J. Syst. Sci. Complex"},{"issue":"24","key":"1086_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.4238","volume":"29","author":"CM Tang","year":"2017","unstructured":"CM Tang, CL Cai, Verifiable mobile online social network privacy-preserving location sharing scheme. Concurr. Comput. Pract. Experience. 29(24), 1\u201310 (2017).","journal-title":"Concurr. Comput. Pract. Experience"},{"issue":"3","key":"1086_CR5","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1002\/sec.758","volume":"7","author":"L Harn","year":"2014","unstructured":"L Harn, Secure secret reconstruction and multi-secret sharing schemes with unconditional secure. Secur. Commun. Netw. 7(3), 567\u2013573 (2014).","journal-title":"Secur. Commun. Netw"},{"issue":"3","key":"1086_CR6","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1007\/s10623-013-9831-6","volume":"73","author":"J Herranz","year":"2014","unstructured":"J Herranz, A Ruiz, G Saez, New results and applications for multi-secret sharing schemes. Des. Codes Cryptography. 73(3), 841\u2013864 (2014).","journal-title":"Des. Codes Cryptography"},{"issue":"6","key":"1086_CR7","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1016\/j.jss.2012.01.027","volume":"85","author":"YX Liu","year":"2012","unstructured":"YX Liu, Efficient (n,t,n) secret sharing schemes. J. Syst. Softw. 85(6), 1325\u20131332 (2012).","journal-title":"J. Syst. Softw"},{"issue":"2","key":"1086_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-016-3862-z","volume":"95","author":"L Harn","year":"2017","unstructured":"L Harn, CF Hsu, (t,n) multi-secret sharing scheme based on bivariate polynomial. Wireless Pers. Commun. 95(2), 1\u201310 (2017).","journal-title":"Wireless Pers. Commun"},{"issue":"8","key":"1086_CR9","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.ic.2009.03.007","volume":"207","author":"J Katz","year":"2009","unstructured":"J Katz, CY Koo, R Kumaresa, Improving the round complexity of VSS in point-to-point networks. Inf. Comput. 207(8), 889\u2013899 (2009).","journal-title":"Inf. Comput"},{"key":"1086_CR10","first-page":"431","volume-title":"ASIACRYPT2010, LNCS","author":"R Kumaresan","year":"2010","unstructured":"R Kumaresan, A Patra, CP Rangan, in ASIACRYPT2010, LNCS. The round complexity of verifiable secret sharing: the statistical case. vol. 6477 (Springer, Heidelberg, 2010), pp. 431\u2013447."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1086-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1086-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1086-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T19:04:49Z","timestamp":1554145489000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1086-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,2]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1086"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1086-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2018,4,2]]},"assertion":[{"value":"7 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"71"}}