{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:49:21Z","timestamp":1770900561723,"version":"3.50.1"},"reference-count":31,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"4","funder":[{"name":"Ariel Cyber Innovation Center"},{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["638121"],"award-info":[{"award-number":["638121"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["152\/17"],"award-info":[{"award-number":["152\/17"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1137\/18m1210782","type":"journal-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T17:51:03Z","timestamp":1658425863000},"page":"1126-1171","source":"Crossref","is-referenced-by-count":4,"title":["Tighter Bounds on MultiParty Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling"],"prefix":"10.1137","volume":"51","author":[{"given":"Amos","family":"Beimel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3167-3294","authenticated-orcid":true,"given":"Iftach","family":"Haitner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9818-456X","authenticated-orcid":true,"given":"Nikolaos","family":"Makriyannis","sequence":"additional","affiliation":[]},{"given":"Eran","family":"Omri","sequence":"additional","affiliation":[]}],"member":"351","published-online":{"date-parts":[[2022,7,21]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_13"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_13"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_14"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46494-6_10"},{"key":"atypb5","volume-title":"How to Implement Bracha's ${O}(\\log n)$ Byzantine Agreement Algorithm, unpublished Manuscript","author":"Awerbuch B.","year":"1985"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_29"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_16"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9168-3"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1145\/357360.357368"},{"key":"atypb10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974782.170"},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1145\/12130.12168"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_25"},{"key":"atypb14","volume-title":"From Fairness to Full Security in Multiparty Computation, manuscript","author":"Cohen R.","year":"2018"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_27"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_10"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9634-3"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"atypb19","first-page":"7","author":"Dwork C.","year":"2016","journal-title":"J. Privacy Confidentiality"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1145\/3051088"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_2"},{"key":"atypb22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_8"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1145\/2049697.2049698"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591842"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1137\/15M1009147"},{"key":"atypb26","doi-asserted-by":"crossref","unstructured":"I. Haitner, N. Makriyannis, and E. Omri,On the Complexity of Fair Coin Flipping, Technical Report TR18-84, Electronic Colloquium on Computational Complexity, 2018.","DOI":"10.1007\/978-3-030-03807-6_20"},{"key":"atypb27","unstructured":"I. Haitner, K. Nissim, E. Omri, R. Shaltiel, and J. Silbak,Computational Two-Party Correlation, Technical Report TR18-071, Electronic Colloquium on Computational Complexity, 2018."},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36033-7_13"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10879-7_9"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_1"},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9199-z"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177696812"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T18:22:30Z","timestamp":1661970150000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/18M1210782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,21]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10.1137\/18M1210782"],"URL":"https:\/\/doi.org\/10.1137\/18m1210782","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,21]]}}}