{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:23:49Z","timestamp":1760955829857},"reference-count":32,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"3","funder":[{"name":"Check Point Institute for Information Security"},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006919","name":"Massachusetts Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006919","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002252","name":"NEC Foundation of America","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002252","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1350619","CNS-1414119","1218461","CNS-1514526","CCF-0746990","CCF-1214844"],"award-info":[{"award-number":["CNS-1350619","CNS-1414119","1218461","CNS-1514526","CCF-0746990","CCF-1214844"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1137\/15m1050963","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T19:57:32Z","timestamp":1530129452000},"page":"1123-1210","source":"Crossref","is-referenced-by-count":19,"title":["Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings"],"prefix":"10.1137","volume":"47","author":[{"given":"Nir","family":"Bitansky","sequence":"first","affiliation":[]},{"given":"Ran","family":"Canetti","sequence":"additional","affiliation":[]},{"given":"Sanjam","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Holmgren","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Huijia","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Pass","sequence":"additional","affiliation":[]},{"given":"Sidharth","family":"Telang","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Vaikuntanathan","sequence":"additional","affiliation":[]}],"member":"351","reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_1"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1007\/s00037-006-0211-8"},{"key":"atypb6","first-page":"483","author":"Asharov G.","year":"2012","journal-title":"Springer"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_9"},{"key":"atypb9","first-page":"527","author":"Applebaum B.","year":"2011","journal-title":"Springer"},{"key":"atypb10","first-page":"25","author":"Applebaum B.","year":"2011","journal-title":"The Netherlands)"},{"key":"atypb11","first-page":"162","author":"Applebaum B.","year":"2014","journal-title":"R.O.C.)"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9241-9"},{"key":"atypb16","first-page":"1","volume":"2001","author":"Barak B.","year":"2001","journal-title":"Advances in Cryptology CRYPTO"},{"key":"atypb17","first-page":"501","author":"Boyle E.","year":"2014","journal-title":"PKC"},{"key":"atypb19","first-page":"423","author":"Barak B.","year":"2010","journal-title":"Springer"},{"key":"atypb21","first-page":"134","author":"Bellare M.","year":"2012","journal-title":"Springer"},{"key":"atypb22","first-page":"784","author":"Bellare M.","year":"2012","journal-title":"NC)"},{"key":"atypb23","first-page":"410","author":"Boneh D.","year":"2013","journal-title":"Springer"},{"key":"atypb24","first-page":"280","author":"Boneh D.","year":"2013","journal-title":"ASIACRYPT (2)"},{"key":"atypb27","first-page":"169","author":"Canetti R.","year":"2016","journal-title":"MIT"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746621"},{"key":"atypb30","first-page":"50","author":"Chung K.-M.","year":"2013","journal-title":"CA)"},{"key":"atypb31","first-page":"468","volume":"2015","author":"Canetti R.","year":"2015","journal-title":"TCC"},{"key":"atypb34","first-page":"93","author":"Dodis Y.","year":"2016","journal-title":"Springer"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49099-0_18"},{"key":"atypb40","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"atypb41","first-page":"465","author":"Gennaro R.","year":"2010","journal-title":"Springer"},{"key":"atypb42","first-page":"405","author":"Gentry C.","year":"2014","journal-title":"Denmark)"},{"key":"atypb48","first-page":"244","author":"Ishai Y.","year":"2002","journal-title":"Spain)"},{"key":"atypb50","first-page":"669","author":"Kiayias A.","year":"2013","journal-title":"CCS"},{"key":"atypb53","first-page":"719","author":"Lu S.","year":"2013","journal-title":"Greece)"},{"key":"atypb55","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"atypb57","first-page":"735","author":"Mukherjee P.","year":"2016","journal-title":"Austria)"},{"key":"atypb58","first-page":"96","author":"Naor M.","year":"2003","journal-title":"Springer"},{"key":"atypb59","doi-asserted-by":"publisher","DOI":"10.1145\/322123.322138"},{"key":"atypb62","first-page":"197","author":"Shi E.","year":"2011","journal-title":"ASIACRYPT"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/15M1050963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,21]],"date-time":"2018-11-21T17:12:08Z","timestamp":1542820328000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/15M1050963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1137\/15M1050963"],"URL":"https:\/\/doi.org\/10.1137\/15m1050963","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]}}}