{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:05:49Z","timestamp":1730343949788,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356447","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"456-461","source":"Crossref","is-referenced-by-count":3,"title":["Multiple assignment secret sharing scheme using hierarchical threshold scheme"],"prefix":"10.23919","author":[{"given":"Kouya","family":"Tochikubo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-014-9195-8"},{"key":"ref11","first-page":"99","article-title":"Secret sharing scheme realizing general access structure","author":"ito","year":"1987","journal-title":"Proc IEEE GLOBECOM &#x2018;99"},{"key":"ref12","first-page":"27","article-title":"Generalized secret sharing and monotone functions","author":"benaloh","year":"1988","journal-title":"Proc Crypto &#x2018;84"},{"key":"ref13","first-page":"1788","article-title":"Efficient secret sharing schemes realizing general access structures","volume":"e87 a","author":"tochikubo","year":"2004","journal-title":"IEICE Trans Fundamentals"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.10.2860"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/E88-A.1.322"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.21.590"},{"journal-title":"Cryptography Theory and Practice","year":"2005","author":"stinson","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056621"},{"key":"ref4","first-page":"390","article-title":"How to (really) share a secret","author":"simmons","year":"1988","journal-title":"Proc of Crypto'88"},{"key":"ref3","first-page":"13","article-title":"Cryptographic key sharing methods for multi-groups and security analysis","volume":"e66","author":"koyama","year":"1983","journal-title":"Trans Of the IECE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0334-8"},{"key":"ref5","first-page":"436","article-title":"Prepositioned shared secret and\/or shared control schemes","author":"simmons","year":"1989","journal-title":"Proc Eurocrypt '89"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/080733802"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2182034"},{"key":"ref2","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proceedings of AFIPS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00373-014-1448-7"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356447.pdf?arnumber=8356447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:24:21Z","timestamp":1527553461000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356447","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}