{"id":"https://openalex.org/W2042291172","doi":"https://doi.org/10.1137/0215035","title":"Relativizations of Unambiguous and Random Polynomial Time Classes","display_name":"Relativizations of Unambiguous and Random Polynomial Time Classes","publication_year":1986,"publication_date":"1986-05-01","ids":{"openalex":"https://openalex.org/W2042291172","doi":"https://doi.org/10.1137/0215035","mag":"2042291172"},"language":"en","primary_location":{"id":"doi:10.1137/0215035","is_oa":false,"landing_page_url":"https://doi.org/10.1137/0215035","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030168679","display_name":"John G. Geske","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"John Geske","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5084360347","display_name":"Joachim Grollmann","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Joachim Grollmann","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030168679"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.8722,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.94029519,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"2","first_page":"511","last_page":"519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.7737233638763428},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6380938291549683},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6027933955192566},{"id":"https://openalex.org/keywords/corollary","display_name":"Corollary","score":0.5476986765861511},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.5115219354629517},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.5067699551582336},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4683957099914551},{"id":"https://openalex.org/keywords/complexity-class","display_name":"Complexity class","score":0.42549169063568115},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.42188185453414917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16805794835090637},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14259913563728333},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11096933484077454},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.08834648132324219}],"concepts":[{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.7737233638763428},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6380938291549683},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6027933955192566},{"id":"https://openalex.org/C2780012671","wikidata":"https://www.wikidata.org/wiki/Q1343870","display_name":"Corollary","level":2,"score":0.5476986765861511},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.5115219354629517},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.5067699551582336},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4683957099914551},{"id":"https://openalex.org/C39637292","wikidata":"https://www.wikidata.org/wiki/Q908207","display_name":"Complexity class","level":3,"score":0.42549169063568115},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.42188185453414917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16805794835090637},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14259913563728333},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11096933484077454},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.08834648132324219},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1137/0215035","is_oa":false,"landing_page_url":"https://doi.org/10.1137/0215035","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1569394207","https://openalex.org/W1992789304","https://openalex.org/W1992972561","https://openalex.org/W1993138363","https://openalex.org/W2010699490","https://openalex.org/W2044504659","https://openalex.org/W2078999165"],"related_works":["https://openalex.org/W2376029318","https://openalex.org/W2388301251","https://openalex.org/W3013941779","https://openalex.org/W1998659141","https://openalex.org/W2032491581","https://openalex.org/W2106367176","https://openalex.org/W2404814723","https://openalex.org/W2003513300","https://openalex.org/W2402456376","https://openalex.org/W2130255638"],"abstract_inverted_index":{"We":[0,32],"study":[1],"relationships":[2,23],"between":[3],"${\\bf":[4,15,18,43,64,69,81,86,95,119],"P}$,":[5],"$NP$":[6],",":[7],"and":[8,11,17,52,104,141],"the":[9,55,112,116],"unambiguous":[10],"random":[12],"time":[13],"classes,":[14,147],"U}$,":[16],"R}$.":[19],"Questions":[20],"concerning":[21],"these":[22],"are":[24,107,129],"motivated":[25],"by":[26,138],"complexity":[27,146],"issues":[28],"in":[29,68,115],"public-key":[30],"cryptosystems.":[31],"prove":[33],"that":[34,42,54,80,118],"there":[35,61],"exists":[36,62],"a":[37,63,75,91],"recursive":[38,76],"oracle":[39,77],"A":[40],"such":[41,53,79],"P}^A":[44,65,120],"\\ne":[45,48,97,100,121,124],"{\\bf":[46,49,98,101,122,125],"U}^A":[47,70,123],"NP}^A":[50,126],"$,":[51,127],"first":[56],"inequality":[57],"is":[58],"\u201cstrong,\u201d":[59],"i.e.,":[60],"$-immune":[66,88],"set":[67],"$.":[71],"Further,":[72],"we":[73,93,128],"construct":[74],"B":[78],"U}^B":[82],"$":[83,103],"contains":[84],"an":[85,134],"R}^B":[87,99],"set.":[89],"As":[90],"corollary,":[92],"obtain":[94],"P}^B":[96],"NP}^B":[102],"both":[105],"inequalities":[106],"strong.":[108],"By":[109],"use":[110],"of":[111,145],"techniques":[113],"employed":[114],"proof":[117],"also":[130],"able":[131],"to":[132],"solve":[133],"open":[135],"problem":[136],"raised":[137],"Book,":[139],"Long":[140],"Selman":[142],"[Quantitative":[143],"relativizations":[144],"SIAM":[148],"J.":[149],"Comput.":[150],"13":[151],"(1984),":[152],"pp":[153],"461\u2013487].":[154]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
