{"id":"https://openalex.org/W2129289679","doi":"https://doi.org/10.1007/bf01388382","title":"A perfect threshold secret sharing scheme to identify cheaters","display_name":"A perfect threshold secret sharing scheme to identify cheaters","publication_year":1995,"publication_date":"1995-05-01","ids":{"openalex":"https://openalex.org/W2129289679","doi":"https://doi.org/10.1007/bf01388382","mag":"2129289679"},"language":"en","primary_location":{"id":"doi:10.1007/bf01388382","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf01388382","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050665904","display_name":"Marco Carpentieri","orcid":"https://orcid.org/0000-0003-4611-3089"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Marco Carpentieri","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto per la Ricerca sui Sistemi Informatici Paralleli, Via Pietro Castellino 111, 80123, Napoli (Na), Italy","Consiglio Nazionale delle Ricerche, Istituto per la Ricerca sui Sistemi Informatici Paralleli, Napoli (Na), Italy"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto per la Ricerca sui Sistemi Informatici Paralleli, Via Pietro Castellino 111, 80123, Napoli (Na), Italy","institution_ids":[]},{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto per la Ricerca sui Sistemi Informatici Paralleli, Napoli (Na), Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5050665904"],"corresponding_institution_ids":[],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":1.1792,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.83892545,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"5","issue":"3","first_page":"183","last_page":"187"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.8698431849479675},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6416552662849426},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5894403457641602},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5633894205093384},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5054507255554199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4782946705818176},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.44920220971107483},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40278160572052},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.36274412274360657},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.26938509941101074},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.08679059147834778}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.8698431849479675},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6416552662849426},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5894403457641602},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5633894205093384},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5054507255554199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4782946705818176},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.44920220971107483},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40278160572052},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.36274412274360657},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.26938509941101074},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.08679059147834778},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/bf01388382","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf01388382","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1529027305","https://openalex.org/W1538558557","https://openalex.org/W1882297107","https://openalex.org/W1965492831","https://openalex.org/W1990304797","https://openalex.org/W2018562795","https://openalex.org/W2064052854","https://openalex.org/W2068101455","https://openalex.org/W2088023978","https://openalex.org/W2141420453","https://openalex.org/W2159401786","https://openalex.org/W2406514759","https://openalex.org/W6635186639"],"related_works":["https://openalex.org/W2356283120","https://openalex.org/W2163216853","https://openalex.org/W2389344805","https://openalex.org/W2377292126","https://openalex.org/W2376867643","https://openalex.org/W2368879407","https://openalex.org/W2079631812","https://openalex.org/W1504170878","https://openalex.org/W2023825511","https://openalex.org/W2370565251"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2025-10-10T00:00:00"}
