{"entities":{"Q6863901":{"pageid":20680024,"ns":120,"title":"Item:Q6863901","lastrevid":75183589,"modified":"2026-04-18T03:20:41Z","type":"item","id":"Q6863901","labels":{"en":{"language":"en","value":"How to make any computational secret sharing scheme adaptively secure"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 8154870"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6863901$02DCFF8F-5624-4ABC-B09F-FBAEF307576E","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"6b35a89442d3bc17cc240c2acfdc9ceafc2fb1c7","datavalue":{"value":{"text":"How to make any computational secret sharing scheme adaptively secure","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q6863901$EAFE491A-2767-4356-915D-FCEC00120BEB","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"9ddc2c382a7cc092f50ad0a93f56b84031991df0","datavalue":{"value":"10.1007/978-3-032-01884-7_11","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6863901$DAA7DDDB-E917-413C-BDDA-E9460D9EC29F","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"d1149ea71300b1da00147afcb5e14fbd98c641bc","datavalue":{"value":{"entity-type":"item","numeric-id":6063530,"id":"Q6063530"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6863901$B6B623A1-BFD8-45A4-8211-795FAD4BBE24","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"9363df5e7fc094937663f2a3bbf6310f170b4f1c","datavalue":{"value":{"entity-type":"item","numeric-id":1629440,"id":"Q1629440"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6863901$195DE5B7-CE15-4AC6-91BA-569D38D26053","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"5eb7c5cda49e010c65abc7807dc1347de80276b0","datavalue":{"value":{"time":"+2026-02-04T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q6863901$04B89752-477C-4B42-8CA6-331994F5CFCF","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b71b42e4e887bf125b7436fe1334aef39047fb5c","datavalue":{"value":"94A62","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6863901$57589FB9-AD55-49A1-877F-6333AAD88BE2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6863901$6B137FE5-E1A7-4736-B9B6-8F4CF2A1A682","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"15a1796e0a556411b4fceba79a85689b10762e00","datavalue":{"value":"8154870","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6863901$2C03E8AD-3B1B-408B-A0A5-A0DF51DC8550","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"3f7018f71ece4a034dae4fb348f52b7c6995afe3","datavalue":{"value":"secure secret sharing","type":"string"},"datatype":"string"},"type":"statement","id":"Q6863901$74085580-D282-45AB-BECC-FECA447AC650","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"53e207e7d1da795c0d03a66fd88ec902ae808a66","datavalue":{"value":"computational secret sharing schemes","type":"string"},"datatype":"string"},"type":"statement","id":"Q6863901$143B35E3-5E76-4526-B9C7-CEDF02CB61A2","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6863901$D19C0FA5-8CB5-48A5-96C3-B83657A6B01A","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"How to make any computational secret sharing scheme adaptively secure","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/How_to_make_any_computational_secret_sharing_scheme_adaptively_secure"}}}}}