{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:27:08Z","timestamp":1729668428441,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/nbis.2013.90","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:36:49Z","timestamp":1388774209000},"page":"539-544","source":"Crossref","is-referenced-by-count":4,"title":["A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors"],"prefix":"10.1109","author":[{"given":"Yuji","family":"Suga","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"18","first-page":"191","article-title":"Fully secure functional encryption with general relations from the decisional linear assumption","author":"okamoto","year":"2010","journal-title":"Crypto"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-17373-8_22","article-title":"Faster fully homomorphic encryption","author":"stehle","year":"2010","journal-title":"ASIACRYPT 2010"},{"journal-title":"EURO-CRYPT2010","article-title":"Fully homomorphic encryption over the integers","year":"2010","author":"dijk","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Advances in Database Systems Series","article-title":"Privacy-preserving data mining: Models and algorithms","year":"2008","author":"aggarwal","key":"11"},{"key":"12","first-page":"216","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"hacigumus","year":"0","journal-title":"SIGMOD02"},{"key":"21","first-page":"631","article-title":"A fast (2, n)-threshold scheme and its application","author":"fujii","year":"2005","journal-title":"Proc CSS2005"},{"key":"20","first-page":"313","article-title":"Safeguarding cryptographic keys","volume":"48","author":"blakley","year":"1979","journal-title":"Proc AFIPS"},{"key":"22","first-page":"637","article-title":"A secret sharing scheme with threshold 3","author":"tada","year":"2005","journal-title":"Proc CSS2005"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e91-a.9.2365"},{"key":"24","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-540-85886-7_31","article-title":"A new (k, n)-threshold secret sharing scheme and its extension","volume":"5222","author":"kurihara","year":"2008","journal-title":"11th Information Security Conference (ISC2008)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E92.A.1808"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2013.150"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"volume":"4","journal-title":"Cloud Computing and Security","year":"0","key":"10"},{"year":"0","key":"1"},{"journal-title":"American Institute of Certified Public Accountants (AICPA) Statement on Auditing Standards (SAS) No 70 Type II","year":"0","key":"7"},{"year":"0","key":"6"},{"journal-title":"NIST's Definition of Cloud Computing","year":"0","key":"5"},{"journal-title":"DMTF's Open Cloud Standards Incubator","year":"0","key":"4"},{"journal-title":"Cloud Computing Use Case White Paper Version 4","year":"0","key":"9"},{"journal-title":"Security Trust & Assurance Registry (STAR)","year":"0","key":"8"}],"event":{"name":"2013 16th International Conference on Network-Based Information Systems (NBiS)","start":{"date-parts":[[2013,9,4]]},"location":"Seo-gu, Gwangju, CA, Korea (South)","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 16th International Conference on Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684444\/6685323\/06685458.pdf?arnumber=6685458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T20:18:23Z","timestamp":1565036303000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6685458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/nbis.2013.90","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}