{"id":"https://openalex.org/W4205500402","doi":"https://doi.org/10.3233/jcs-210065","title":"Optimal threshold padlock systems","display_name":"Optimal threshold padlock systems","publication_year":2021,"publication_date":"2021-12-21","ids":{"openalex":"https://openalex.org/W4205500402","doi":"https://doi.org/10.3233/jcs-210065"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-210065","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210065","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210065?id=journal-of-computer-security%2Fjcs210065","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210065?id=journal-of-computer-security%2Fjcs210065","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087551010","display_name":"Jannik Dreier","orcid":"https://orcid.org/0000-0002-1026-3360"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jannik Dreier","raw_affiliation_strings":["Universit\u00e9 de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France. E-mail:\u00a0","PESTO -\n        Proof techniques for security protocols","Universit\u00e9 de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France. E-mail:\u00a0Jannik.Dreier@loria.fr"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France. E-mail:\u00a0","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"PESTO -\n        Proof techniques for security protocols","institution_ids":[]},{"raw_affiliation_string":"Universit\u00e9 de Lorraine, CNRS, Inria, LORIA, F-54000 Nancy, France. E-mail:\u00a0Jannik.Dreier@loria.fr","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I90183372","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091337059","display_name":"Jean\u2010Guillaume Dumas","orcid":"https://orcid.org/0000-0002-2591-172X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210149092","display_name":"Laboratoire Jean Kuntzmann","ror":"https://ror.org/04ett5b41","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210149092","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Guillaume Dumas","raw_affiliation_strings":["University Grenoble Alpes, Laboratoire Jean Kuntzmann, CNRS UMR 5224, 38058 Grenoble, France. E-mail:\u00a0","University Grenoble Alpes, Laboratoire Jean Kuntzmann, CNRS UMR 5224, 38058 Grenoble, France. E-mail:\u00a0Jean-Guillaume.Dumas@univ-grenoble-alpes.fr"],"affiliations":[{"raw_affiliation_string":"University Grenoble Alpes, Laboratoire Jean Kuntzmann, CNRS UMR 5224, 38058 Grenoble, France. E-mail:\u00a0","institution_ids":["https://openalex.org/I4210149092","https://openalex.org/I1294671590","https://openalex.org/I899635006"]},{"raw_affiliation_string":"University Grenoble Alpes, Laboratoire Jean Kuntzmann, CNRS UMR 5224, 38058 Grenoble, France. E-mail:\u00a0Jean-Guillaume.Dumas@univ-grenoble-alpes.fr","institution_ids":["https://openalex.org/I4210149092","https://openalex.org/I1294671590","https://openalex.org/I899635006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024799131","display_name":"Pascal Lafourcade","orcid":"https://orcid.org/0000-0002-4459-511X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I198244214","display_name":"Universit\u00e9 Clermont Auvergne","ror":"https://ror.org/01a8ajp46","country_code":"FR","type":"education","lineage":["https://openalex.org/I198244214"]},{"id":"https://openalex.org/I4210143836","display_name":"Clermont Universit\u00e9","ror":"https://ror.org/03yf5zr20","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210143836"]},{"id":"https://openalex.org/I4210099416","display_name":"Laboratoire d'Informatique, de Mod\u00e9lisation et d'Optimisation des Syst\u00e8mes","ror":"https://ror.org/00t3fpp34","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I198244214","https://openalex.org/I198244214","https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993","https://openalex.org/I4210099416","https://openalex.org/I4210123221","https://openalex.org/I4210159245","https://openalex.org/I4387154249"]},{"id":"https://openalex.org/I4210103002","display_name":"University of Clermont Auvergne","ror":null,"country_code":"FR","type":null,"lineage":["https://openalex.org/I4210103002"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pascal Lafourcade","raw_affiliation_strings":["University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0,\u00a0","University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0Pascal.Lafourcade@uca.fr,\u00a0Leo.Robert@uca.fr"],"affiliations":[{"raw_affiliation_string":"University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210099416","https://openalex.org/I4210103002","https://openalex.org/I4210143836","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0Pascal.Lafourcade@uca.fr,\u00a0Leo.Robert@uca.fr","institution_ids":["https://openalex.org/I4210099416","https://openalex.org/I198244214","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071225425","display_name":"L\u00e9o Robert","orcid":"https://orcid.org/0000-0002-9638-3143"},"institutions":[{"id":"https://openalex.org/I4210143836","display_name":"Clermont Universit\u00e9","ror":"https://ror.org/03yf5zr20","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210143836"]},{"id":"https://openalex.org/I4210103002","display_name":"University of Clermont Auvergne","ror":null,"country_code":"FR","type":null,"lineage":["https://openalex.org/I4210103002"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I198244214","display_name":"Universit\u00e9 Clermont Auvergne","ror":"https://ror.org/01a8ajp46","country_code":"FR","type":"education","lineage":["https://openalex.org/I198244214"]},{"id":"https://openalex.org/I4210099416","display_name":"Laboratoire d'Informatique, de Mod\u00e9lisation et d'Optimisation des Syst\u00e8mes","ror":"https://ror.org/00t3fpp34","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I198244214","https://openalex.org/I198244214","https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993","https://openalex.org/I4210099416","https://openalex.org/I4210123221","https://openalex.org/I4210159245","https://openalex.org/I4387154249"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"L\u00e9o Robert","raw_affiliation_strings":["University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0,\u00a0","University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0Pascal.Lafourcade@uca.fr,\u00a0Leo.Robert@uca.fr"],"affiliations":[{"raw_affiliation_string":"University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0,\u00a0","institution_ids":["https://openalex.org/I4210099416","https://openalex.org/I4210103002","https://openalex.org/I4210143836","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"University Clermont Auvergne, LIMOS, CNRS UMR 6158, 63178 Aubi\u00e8re, France. E-mails:\u00a0Pascal.Lafourcade@uca.fr,\u00a0Leo.Robert@uca.fr","institution_ids":["https://openalex.org/I4210099416","https://openalex.org/I198244214","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087551010"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210121838","https://openalex.org/I90183372"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1978497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":"5","first_page":"655","last_page":"688"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5493780970573425},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5355755090713501},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4999208450317383},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48580169677734375},{"id":"https://openalex.org/keywords/sublinear-function","display_name":"Sublinear function","score":0.4602144956588745},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4349074959754944},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.43011510372161865},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.42851993441581726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28949174284935},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.10003212094306946}],"concepts":[{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5493780970573425},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5355755090713501},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4999208450317383},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48580169677734375},{"id":"https://openalex.org/C117160843","wikidata":"https://www.wikidata.org/wiki/Q338652","display_name":"Sublinear function","level":2,"score":0.4602144956588745},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4349074959754944},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.43011510372161865},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.42851993441581726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28949174284935},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.10003212094306946},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/jcs-210065","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210065","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210065?id=journal-of-computer-security%2Fjcs210065","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-03497369v1","is_oa":true,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-03497369","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 0926-227X","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:HAL:hal-03497369v3","is_oa":true,"landing_page_url":"https://hal.science/hal-03497369","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2022, 30 (5), pp.655-688. &#x27E8;10.3233/JCS-210065&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.3233/jcs-210065","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-210065","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs210065?id=journal-of-computer-security%2Fjcs210065","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4205500402.pdf","grobid_xml":"https://content.openalex.org/works/W4205500402.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1503874213","https://openalex.org/W1516390128","https://openalex.org/W1984242286","https://openalex.org/W1997820219","https://openalex.org/W2012083420","https://openalex.org/W2014843353","https://openalex.org/W2016928660","https://openalex.org/W2067306608","https://openalex.org/W2070678975","https://openalex.org/W2082491781","https://openalex.org/W2087567316","https://openalex.org/W2099000090","https://openalex.org/W2112963602","https://openalex.org/W2115213896","https://openalex.org/W2122975390","https://openalex.org/W2141420453","https://openalex.org/W2142293082","https://openalex.org/W2147096936","https://openalex.org/W2168970529","https://openalex.org/W2574091758","https://openalex.org/W4248530476","https://openalex.org/W4253746564","https://openalex.org/W4388318275","https://openalex.org/W6601760687"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2363629235","https://openalex.org/W2998215210","https://openalex.org/W2375034746","https://openalex.org/W3088939963","https://openalex.org/W2963202145","https://openalex.org/W1504170878","https://openalex.org/W3199385136","https://openalex.org/W2357761884"],"abstract_inverted_index":{"In":[0,14,83],"1968,":[1],"Liu":[2,61,104],"described":[3],"the":[4,31,34,67,79,101,110,118,247],"problem":[5,45,102],"of":[6,21,81,103,112,120,167],"securing":[7,33],"documents":[8],"in":[9,46,78,91,146],"a":[10,39,164,208],"shared":[11],"secret":[12,35,54,260],"project.":[13],"an":[15,50,96,182,216,231],"example,":[16],"at":[17],"least":[18],"six":[19],"out":[20],"eleven":[22],"participating":[23],"scientists":[24],"need":[25],"to":[26,29,42,100,157,218,258],"be":[27],"present":[28],"open":[30],"lock":[32],"documents.":[36],"Shamir":[37,63],"proposed":[38],"mathematical":[40],"solution":[41,69,99],"this":[43,84],"physical":[44,71,98,107,248],"1979,":[47],"by":[48],"designing":[49],"efficient":[51],"k-out-of-":[52,132,234],"n":[53,133,190,221,235],"sharing":[55,261],"scheme":[56,184],"based":[57],"on":[58],"Lagrange\u2019s":[59],"interpolation.":[60],"and":[62,76,94,162,193,211],"also":[64,202,252],"claimed":[65],"that":[66,105,125,186,254],"minimal":[68],"using":[70],"locks":[72],"is":[73,114,256],"clearly":[74],"impractical":[75],"exponential":[77],"number":[80,111,119],"participants.":[82,121],"paper":[85],"we":[86,123,153,180,229],"relax":[87],"some":[88],"implicit":[89],"assumptions":[90],"their":[92],"claim":[93],"propose":[95,181],"optimal":[97,183],"uses":[106],"padlocks,":[108],"but":[109],"padlocks":[113,171],"not":[115],"greater":[116],"than":[117,176,196],"Then,":[122],"show":[124,253],"no":[126],"device":[127],"can":[128],"do":[129],"better":[130],"for":[131,148,172,188],"threshold":[134,160,174,191,236],"padlock":[135,237],"systems":[136,192,222,238],"as":[137,139],"soon":[138],"[Formula:":[140,168,197,224,241],"see":[141,169,198,225,242],"text],":[142],"which":[143],"holds":[144],"true":[145],"particular":[147],"Liu\u2019s":[149],"example.":[150],"More":[151],"generally,":[152],"derive":[154],"bounds":[155],"required":[156],"implement":[158,259],"any":[159,173],"system":[161],"prove":[163],"lower":[165],"bound":[166,187],"text]":[170,199,226,243],"larger":[175],"2.":[177],"For":[178],"instance":[179],"reaching":[185],"2-out-of-":[189],"requiring":[194],"less":[195],"padlocks.":[200,227,244],"We":[201],"discuss":[203],"more":[204],"complex":[205],"access":[206],"structures,":[207],"wrapping":[209],"technique,":[210],"other":[212],"sublinear":[213],"realizations":[214],"like":[215],"algorithm":[217,232],"generate":[219],"3-out-of-":[220],"with":[223,239],"Finally":[228],"give":[230],"building":[233],"only":[240],"Apart":[245],"from":[246],"world,":[249],"our":[250],"results":[251],"it":[255],"possible":[257],"over":[262],"small":[263],"fields.":[264]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
