{"id":"https://openalex.org/W2238262329","doi":"https://doi.org/10.1137/130928236","title":"On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation","display_name":"On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2238262329","doi":"https://doi.org/10.1137/130928236","mag":"2238262329"},"language":"en","primary_location":{"id":"doi:10.1137/130928236","is_oa":false,"landing_page_url":"https://doi.org/10.1137/130928236","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065373891","display_name":"Nir Bitansky","orcid":"https://orcid.org/0000-0001-8361-6035"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nir Bitansky","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5035828031","display_name":"Omer Paneth","orcid":"https://orcid.org/0000-0001-8561-1123"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Omer Paneth","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065373891"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1572,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.90406056,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"44","issue":"5","first_page":"1325","last_page":"1383"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/impossibility","display_name":"Impossibility","score":0.9015548229217529},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6945374011993408},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6895647048950195},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.589119553565979},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5382964015007019},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.5374115109443665},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.5287898182868958},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.519587516784668},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.517509937286377},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.4387241303920746},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34873828291893005},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29799097776412964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27058282494544983},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13163864612579346}],"concepts":[{"id":"https://openalex.org/C2776261394","wikidata":"https://www.wikidata.org/wiki/Q315562","display_name":"Impossibility","level":2,"score":0.9015548229217529},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6945374011993408},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6895647048950195},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.589119553565979},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5382964015007019},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.5374115109443665},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.5287898182868958},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.519587516784668},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.517509937286377},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.4387241303920746},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34873828291893005},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29799097776412964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27058282494544983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13163864612579346},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1137/130928236","is_oa":false,"landing_page_url":"https://doi.org/10.1137/130928236","pdf_url":null,"source":{"id":"https://openalex.org/S153560523","display_name":"SIAM Journal on Computing","issn_l":"0097-5397","issn":["0097-5397","1095-7111"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320508","host_organization_name":"Society for Industrial and Applied Mathematics","host_organization_lineage":["https://openalex.org/P4310320508"],"host_organization_lineage_names":["Society for Industrial and Applied Mathematics"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SIAM Journal on Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W185553","https://openalex.org/W150803724","https://openalex.org/W157503813","https://openalex.org/W1490590996","https://openalex.org/W1502416796","https://openalex.org/W1526379157","https://openalex.org/W1528853875","https://openalex.org/W1561122377","https://openalex.org/W1621317130","https://openalex.org/W1970606468","https://openalex.org/W1971291564","https://openalex.org/W1987890787","https://openalex.org/W1995926987","https://openalex.org/W1996171547","https://openalex.org/W1996888795","https://openalex.org/W2002919335","https://openalex.org/W2011112377","https://openalex.org/W2012045293","https://openalex.org/W2014055576","https://openalex.org/W2017964377","https://openalex.org/W2021733015","https://openalex.org/W2027528470","https://openalex.org/W2031533839","https://openalex.org/W2033989039","https://openalex.org/W2041528483","https://openalex.org/W2072677341","https://openalex.org/W2074929468","https://openalex.org/W2075455730","https://openalex.org/W2075906644","https://openalex.org/W2098121410","https://openalex.org/W2103230338","https://openalex.org/W2107324709","https://openalex.org/W2111749650","https://openalex.org/W2123783718","https://openalex.org/W2124665615","https://openalex.org/W2126661026","https://openalex.org/W2132951912","https://openalex.org/W2136012769","https://openalex.org/W2141287197","https://openalex.org/W2142968417","https://openalex.org/W2144613321","https://openalex.org/W2146856790","https://openalex.org/W2148888468","https://openalex.org/W2158889011","https://openalex.org/W2159793929","https://openalex.org/W2161196440","https://openalex.org/W2177209050","https://openalex.org/W2399379569","https://openalex.org/W2487893106","https://openalex.org/W3021547345","https://openalex.org/W4250445866"],"related_works":["https://openalex.org/W3207190435","https://openalex.org/W1993458326","https://openalex.org/W3158728532","https://openalex.org/W3187976475","https://openalex.org/W1981281205","https://openalex.org/W1980227445","https://openalex.org/W3030007483","https://openalex.org/W4210493335","https://openalex.org/W2069535412","https://openalex.org/W19911921"],"abstract_inverted_index":{"The":[0,105,174,189],"introduction":[1],"of":[2,22,91,107,126,195,204,237],"a":[3,13,36,145,181,211,225,235],"non-black-box":[4,44,50,110],"simulation":[5,51,111],"technique":[6,26,52,59,93,151,179],"by":[7,215],"Barak":[8,196,216],"(FOCS":[9],"2001)":[10,200],"has":[11,27,112],"been":[12],"major":[14],"landmark":[15],"in":[16,39,115,159,167,177],"cryptography,":[17],"breaking":[18],"the":[19,48,160,192,202,220],"previous":[20,135],"barriers":[21],"black-box":[23,102],"impossibility.":[24],"Barak's":[25,58,141],"given":[28],"rise":[29],"to":[30,74,140,201,234],"various":[31,75],"powerful":[32],"applications":[33],"and":[34,70,84,128,170],"is":[35,94,180],"key":[37],"component":[38],"all":[40],"known":[41],"protocols":[42,72,158],"with":[43,97,109,117,152,206],"simulation.":[45],"We":[46],"present":[47],"first":[49],"that":[53,239],"does":[54],"not":[55],"rely":[56],"on":[57,61],"(or":[60],"nonstandard":[62],"assumptions).":[63],"Invoking":[64],"this":[65],"technique,":[66,142],"we":[67,143,223],"obtain":[68],"new":[69,182],"improved":[71],"resilient":[73],"resetting":[76],"attacks.":[77],"These":[78],"improvements":[79,166],"include":[80],"weaker":[81],"computational":[82,172],"assumptions":[83],"better":[85],"round":[86,168],"complexity.":[87],"A":[88],"prominent":[89],"feature":[90],"our":[92,150,178],"its":[95],"compatibility":[96],"rewinding":[98,108],"techniques":[99],"from":[100,131,228],"classic":[101],"zero-knowledge":[103,232],"protocols.":[104],"combination":[106],"proven":[113],"instrumental":[114],"coping":[116],"challenging":[118],"goals":[119],"such":[120],"as":[121,163,165],"simultaneously":[122],"resettable":[123,129,157],"zero-knowledge,":[124],"proofs":[125],"knowledge,":[127],"security":[130],"one-way":[132],"functions.":[133],"While":[134],"works":[136],"required":[137,171],"tailored":[138],"modifications":[139],"give":[144],"general":[146,186],"recipe":[147],"for":[148,185],"combining":[149],"rewinding.":[153],"This":[154],"yields":[155],"simplified":[156],"above":[161],"settings,":[162],"well":[164],"complexity":[169],"assumptions.":[173],"main":[175],"ingredient":[176],"impossibility":[183,193],"result":[184,194],"program":[187],"obfuscation.":[188],"results":[190],"extend":[191],"et":[197,217],"al.":[198,218],"(CRYPTO":[199],"case":[203],"obfuscation":[205],"approximate":[207],"functionality,":[208],"thus":[209],"settling":[210],"question":[212],"left":[213],"open":[214],"In":[219],"converse":[221],"direction,":[222],"show":[224],"generic":[226],"transformation":[227],"any":[229],"resettably":[230],"sound":[231],"protocol":[233],"family":[236],"functions":[238],"cannot":[240],"be":[241],"obfuscated.":[242]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
