{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T07:25:20Z","timestamp":1766647520153},"reference-count":72,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"2","funder":[{"name":"Alon Young Faculty Fellowship"},{"DOI":"10.13039\/501100005155","name":"Azrieli Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005155","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011643","name":"Blavatnik Family Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011643","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-15-C-0226","W911NF-15-C-0236"],"award-info":[{"award-number":["W911NF-15-C-0226","W911NF-15-C-0236"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["18\/484"],"award-info":[{"award-number":["18\/484"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1789\/19"],"award-info":[{"award-number":["1789\/19"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1350619","CNS-1414119"],"award-info":[{"award-number":["CNS-1350619","CNS-1414119"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1137\/20m1319565","type":"journal-article","created":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T21:28:47Z","timestamp":1643318927000},"page":"STOC19-156-STOC19-199","source":"Crossref","is-referenced-by-count":2,"title":["Weak Zero-Knowledge beyond the Black-Box Barrier"],"prefix":"10.1137","volume":"52","author":[{"given":"Nir","family":"Bitansky","sequence":"first","affiliation":[]},{"given":"Dakshita","family":"Khurana","sequence":"additional","affiliation":[]},{"given":"Omer","family":"Paneth","sequence":"additional","affiliation":[]}],"member":"351","published-online":{"date-parts":[[2022,1,27]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(91)90006-Q"},{"key":"atypb2","series-title":"Lecture Notes in Comput. Sci.","first-page":"119","volume-title":"EUROCRYPT","author":"Aiello W.","year":"2045"},{"key":"atypb3","first-page":"612","volume-title":"TCC 2017, Baltimore, MD, Proceedings, Part I","author":"Ananth P.","year":"2017"},{"key":"atypb4","first-page":"275","author":"Badrinarayanan S.","year":"2017","journal-title":"Part"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959885"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1137\/050641958"},{"key":"atypb7","first-page":"121","volume-title":"First Theory of Cryptography Conference, TCC 2004, Cambridge, MA","author":"Barak B.","year":"2004"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_20"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_4"},{"key":"atypb10","first-page":"542","volume-title":"TCC 2016-A, Tel Aviv, Israel, Proceedings, Part II","author":"Bellare M.","year":"2016"},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64378-2_13"},{"key":"atypb12","first-page":"57","volume-title":"TCC 2016-B, Beijing, China, Proceedings, Part I","author":"Bitansky N.","year":"2016"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9241-9"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591859"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188870"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03807-6_8"},{"key":"atypb17","first-page":"190","volume-title":"TCC 2012, Taormina, Sicily, Italy","author":"Bitansky N.","year":"2012"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1137\/130928236"},{"key":"atypb19","first-page":"401","volume-title":"TCC 2015, Warsaw, Poland, Proceedings, Part II","author":"Bitansky N.","year":"2015"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1137\/0213053"},{"key":"atypb21","first-page":"316","author":"Boyle E.","year":"2013","journal-title":"Part"},{"key":"atypb22","first-page":"236","author":"Boyle E.","year":"2015","journal-title":"Part"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03810-6_14"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_8"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335334"},{"key":"atypb27","first-page":"577","author":"Chen Y.","year":"2018","journal-title":"Part"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.14"},{"key":"atypb29","first-page":"66","volume-title":"TCC 2015, Warsaw, Poland, Proceedings, Part I","author":"Chung K.-M.","year":"2015"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1137\/130946083"},{"key":"atypb31","first-page":"45","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Cramer R.","year":"2002"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.59"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539703426817"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1145\/950620.950623"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792230010"},{"key":"atypb36","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100272"},{"key":"atypb37","first-page":"3","author":"Fleischhacker N.","year":"2018","journal-title":"Part"},{"key":"atypb38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1137\/14095772X"},{"key":"atypb40","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488667"},{"key":"atypb41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2017.60"},{"key":"atypb42","doi-asserted-by":"crossref","unstructured":"C. Gentry,A Fully Homomorphic Encryption Scheme, Ph.D. thesis, Stanford University, 2009,crypto.stanford.edu\/craig.","DOI":"10.1145\/1536414.1536440"},{"key":"atypb43","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"atypb44","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791220688"},{"key":"atypb45","doi-asserted-by":"publisher","DOI":"10.1145\/116825.116852"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"key":"atypb47","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"atypb48","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"atypb49","first-page":"537","volume-title":"TCC 2017, Baltimore, MD, Proceedings, Part II","author":"Goyal R.","year":"2017"},{"key":"atypb50","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2017.62"},{"key":"atypb51","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488637"},{"key":"atypb52","doi-asserted-by":"publisher","DOI":"10.1145\/2220357.2220358"},{"key":"atypb53","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055744"},{"key":"atypb54","doi-asserted-by":"publisher","DOI":"10.1137\/100790537"},{"key":"atypb55","first-page":"220","volume-title":"6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, Proceedings","author":"Haitner I.","year":"2009"},{"key":"atypb56","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9092-8"},{"key":"atypb57","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"atypb58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_6"},{"key":"atypb59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_8"},{"key":"atypb60","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9081-y"},{"key":"atypb61","series-title":"Lecture Notes in Comput","volume-title":"Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference","author":"Katz J.","year":"2017"},{"key":"atypb62","unstructured":"A. Lombardi and L. Schaeffer,A Note on Key Agreement and Non-Interactive Commitments, Report 2019\/279, Cryptology ePrint Archive, 2019,https:\/\/eprint.iacr.org\/2019\/279."},{"key":"atypb63","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196774"},{"key":"atypb64","first-page":"448","volume-title":"Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms","author":"Naor M.","year":"2001"},{"key":"atypb65","first-page":"133","volume-title":"Proceedings of the Sixth Annual Structure in Complexity Theory Conference","author":"Ostrovsky R.","year":"1991"},{"key":"atypb66","doi-asserted-by":"publisher","DOI":"10.1109\/ISTCS.1993.253489"},{"key":"atypb67","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"atypb68","first-page":"160","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Pass R.","year":"2003"},{"key":"atypb69","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181961"},{"key":"atypb70","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"atypb71","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646133"},{"key":"atypb72","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2017.61"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/epubs.siam.org\/doi\/pdf\/10.1137\/20M1319565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T19:57:53Z","timestamp":1682711873000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/20M1319565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,27]]},"references-count":72,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1137\/20M1319565"],"URL":"https:\/\/doi.org\/10.1137\/20m1319565","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"value":"0097-5397","type":"print"},{"value":"1095-7111","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,27]]}}}