{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T01:32:09Z","timestamp":1648603929822},"reference-count":18,"publisher":"Institution of Engineering and Technology (IET)","issue":"5","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1049\/iet-ifs.2016.0276","type":"journal-article","created":{"date-parts":[[2017,3,3]],"date-time":"2017-03-03T02:23:47Z","timestamp":1488507827000},"page":"287-293","source":"Crossref","is-referenced-by-count":0,"title":["Computational SS and conversion protocols in both active and passive settings"],"prefix":"10.1049","volume":"11","author":[{"given":"Ryo","family":"Kikuchi","sequence":"first","affiliation":[{"name":"NTT CorporationTokyoJapan"}]},{"given":"Dai","family":"Ikarashi","sequence":"additional","affiliation":[{"name":"NTT CorporationTokyoJapan"}]},{"given":"Koji","family":"Chida","sequence":"additional","affiliation":[{"name":"NTT CorporationTokyoJapan"}]},{"given":"Koki","family":"Hamada","sequence":"additional","affiliation":[{"name":"NTT CorporationTokyoJapan"}]},{"given":"Wakaha","family":"Ogata","sequence":"additional","affiliation":[{"name":"Department of Information and Communications EngineeringTokyo Institute of TechnologyTokyoJapan"}]}],"member":"265","published-online":{"date-parts":[[2017,9]]},"reference":[{"key":"e_1_2_8_2_2","doi-asserted-by":"crossref","unstructured":"Blakley G.R.: \u2018Safeguarding cryptographic keys\u2019.Proc. of the National Computer Conf. 1979 vol.48 pp.313\u2013317","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_8_4_2","unstructured":"Burkhart M. Strasser M. Many D.et al: \u2018SEPIA: privacy\u2010preserving aggregation of multi\u2010domain network events and statistics\u2019.USENIX Security Symp. USENIX Association 2010 pp.223\u2013240"},{"key":"e_1_2_8_5_2","first-page":"192","volume-title":"ESORICS","author":"Bogdanov D.","year":"2008"},{"issue":"9","key":"e_1_2_8_6_2","first-page":"945","article-title":"Secret sharing system using (k,l,n) threshold scheme","volume":"68","author":"Yamamoto H.","year":"1985","journal-title":"IECE Trans."},{"key":"e_1_2_8_7_2","first-page":"242","volume-title":"CRYPTO","author":"Blakley G.R.","year":"1984"},{"key":"e_1_2_8_8_2","first-page":"136","volume-title":"CRYPTO","author":"Krawczyk H.","year":"1993"},{"key":"e_1_2_8_9_2","first-page":"342","volume-title":"TCC","author":"Cramer R.","year":"2005"},{"key":"e_1_2_8_10_2","first-page":"56","article-title":"Secret sharing scheme realizing general access structure","volume":"72","author":"Ito M.","year":"1989","journal-title":"IEICE Trans.."},{"key":"e_1_2_8_11_2","first-page":"419","volume-title":"ACISP","author":"Kikuchi R.","year":"2013"},{"issue":"1","key":"e_1_2_8_12_2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1587\/transfun.E98.A.213","article-title":"Secret sharing with share\u2010conversion: achieving small share\u2010size and extendibility to multiparty computation","volume":"98","author":"Kikuchi R.","year":"2015","journal-title":"IEICE Trans.."},{"key":"e_1_2_8_13_2","doi-asserted-by":"crossref","unstructured":"Ben\u2010Sasson E. Fehr S. Ostrovsky R.: \u2018Near\u2010linear unconditionally\u2010secure multiparty computation with a dishonest minority\u2019.Advances in Cryptology\u2013 CRYPTO 2012\u201332nd Annual Cryptology Conf. Proc. Santa Barbara CA USA 19\u201323 August2012(LNCS 7417) pp.663\u2013680","DOI":"10.1007\/978-3-642-32009-5_39"},{"key":"e_1_2_8_14_2","first-page":"278","volume-title":"CT\u2010RSA 2012","author":"Damg\u00e5rd I.","year":"2012"},{"key":"e_1_2_8_15_2","first-page":"699","volume-title":"STOC","author":"Franklin M.K.","year":"1992"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_2_8_17_2","unstructured":"Beimel A.: \u2018Secure schemes for secret sharing and key distribution\u2019. PhD thesis Israel Institute of Technology 1996"},{"key":"e_1_2_8_18_2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511546891","volume-title":"The foundations of cryptography\u2013 volume 1, basic techniques","author":"Goldreich O.","year":"2001"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0319-z"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2016.0276","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2016.0276","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2016.0276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T21:59:10Z","timestamp":1610575150000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2016.0276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["10.1049\/iet-ifs.2016.0276"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2016.0276","archive":["Portico"],"relation":{},"ISSN":["1751-8717","1751-8717"],"issn-type":[{"value":"1751-8717","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9]]}}}