{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T11:24:23Z","timestamp":1648639463285},"reference-count":0,"publisher":"Rinton Press","issue":"1&2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["QIC"],"published-print":{"date-parts":[[2013,1]]},"abstract":"In this correspondence, we point out a major security problem in the secret sharing scheme proposed in QIC 12(3-4), 0253-0261, 2012.<\/jats:p>","DOI":"10.26421\/qic13.1-2-10","type":"journal-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T03:06:29Z","timestamp":1614827189000},"page":"178-180","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of a secret sharing scheme"],"prefix":"10.26421","volume":"13","author":[{"given":"Subhamoy","family":"Maitra","sequence":"first","affiliation":[]},{"given":"Kaushik","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"10955","published-online":{"date-parts":[[2013,1]]},"container-title":["Quantum Information and Computation"],"original-title":[],"deposited":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T03:07:20Z","timestamp":1614827240000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.rintonpress.com\/journals\/doi\/QIC13.1-2-10.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":0,"journal-issue":{"issue":"1&2","published-online":{"date-parts":[[2013,1]]},"published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.26421\/qic13.1-2-10","relation":{},"ISSN":["1533-7146","1533-7146"],"issn-type":[{"value":"1533-7146","type":"print"},{"value":"1533-7146","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1]]}}}