Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions

    Zero Knowledge Proofs (ZKPs) are one of the most striking innovations in theoretical computer science. In practice, the prevalent ZKP methods are, at times, too complicated to be useful for real-life applicati...

    Michael O. Rabin, Yishay Mansour, S. Muthukrishnan in Automata, Languages, and Programming (2012)

  2. No Access

    Chapter and Conference Paper

    Cryptographic Combinatorial Clock-Proxy Auctions

    We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discover...

    David C. Parkes, Michael O. Rabin in Financial Cryptography and Data Security (2009)

  3. No Access

    Chapter and Conference Paper

    DISC 20th Anniversary: Invited Talk Provably Unbreakable Hyper-Encryption Using Distributed Systems

    Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the Limited Acces...

    Michael O. Rabin in Distributed Computing (2007)

  4. No Access

    Chapter and Conference Paper

    Provably Unbreakable Hyper-encryption Using Distributed Systems

    Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the Limited Acces...

    Michael O. Rabin in Distributed Computing (2006)

  5. No Access

    Chapter and Conference Paper

    Identity-Based Zero-Knowledge

    We introduce and define the notion of identity-based zero-knowledge, concentrating on the non-interactive setting. In this setting, our notion allows any prover to widely disseminate a proof of a statement while ...

    Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin in Security in Communication Networks (2005)

  6. No Access

    Chapter and Conference Paper

    Hyper Encryption and Everlasting Secrets

    A fundamental problem in cryptography is that of secure communication over an insecure channel, where a sender Alice wishes to communicate with a receiver Bob, in the presence of a powerful Adversary ...

    Michael O. Rabin in Algorithms and Complexity (2003)

  7. No Access

    Article

    Online Scheduling of Parallel Programs on Heterogeneous Systems with Applications to Cilk

    We study the problem of executing parallel programs, in particular Cilk programs, on a collection of processors of different speeds. We consider a model in which each processor maintains an estimate of its own...

    Michael A. Bender, Michael O. Rabin in Theory of Computing Systems (2002)

  8. No Access

    Chapter and Conference Paper

    Hyper-Encryption and Everlasting Security

    We present substantial extensions of works [1], [2], and all previous works, on encryption in the bounded storage model introduced by Maurer in [25]. The major new result is that the shared secret key employed by...

    Yan Zong Ding, Michael O. Rabin in STACS 2002 (2002)

  9. Chapter and Conference Paper

    Information Theoretically Secure Communication in the Limited Storage Space Model

    We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-storage-space model postulates an eavesdrop...

    Yonatan Aumann, Michael O. Rabin in Advances in Cryptology — CRYPTO’ 99 (1999)

  10. No Access

    Chapter and Conference Paper

    Linear Consistency Testing

    We extend the notion of linearity testing to the task of checking linear-consistency of multiple functions. Informally, functions are “linear” if their graphs form straight lines on the plane. Two such functio...

    Yonatan Aumann, Johan Håstad in Randomization, Approximation, and Combinat… (1999)

  11. No Access

    Chapter and Conference Paper

    Super-Exponential Complexity of Presburger Arithmetic

    Lower bounds are established on the computational complexity of the decision problem and on the inherent lengths of proofs for two classical decidable theories of logic: the first-order theory of the real numb...

    Michael J. Fischer, Michael O. Rabin in Quantifier Elimination and Cylindrical Alg… (1998)

  12. Chapter and Conference Paper

    Authentication, enhanced security and error correcting codes

    In electronic communications and in access to systems, the issue of authentication of the Sender S of a message M, as well as of the message itself, is of paramount importance. Recently S. Goldwasser has raised t...

    Yonatan Aumann, Michael O. Rabin in Advances in Cryptology — CRYPTO '98 (1998)

  13. No Access

    Chapter and Conference Paper

    Correctness of programs and protocols through randomization

    Michael O. Rabin in Advances in Computing Science — ASIAN'97 (1997)

  14. No Access

    Chapter and Conference Paper

    Optimal Parallel Pattern Matching Through Randomization

    We present an optimal parallel pattern matching algorithm for d-dimensional patterns. Namely, for two d-dimensional arrays A and B, ∣A∣ = m d = M, ∣B∣ = n ...

    Michael O. Rabin in Sequences II (1993)

  15. No Access

    Chapter and Conference Paper

    Dependable parallel computing by randomization (Abstract)

    Michael O. Rabin in Future Tendencies in Computer Science, Control and Applied Mathematics (1992)

  16. No Access

    Chapter and Conference Paper

    The Information Dispersal Algorithm and its Applications

    We present the Information Dispersal Algorithm (IDA) which breaks a file F of length L = |F| into n pieces F i , 1 ≤ in, each of length |F i

    Michael O. Rabin in Sequences (1990)

  17. No Access

    Chapter and Conference Paper

    Discovering Repetitions in Strings

    There are many variants of problems involving string matchings. The basic problem is to determine whether a pattern string x appears as a (contiguous) substring of a text y, i.e. whether for some strings u, v,...

    Michael O. Rabin in Combinatorial Algorithms on Words (1985)

  18. No Access

    Article

    The choice coordination problem

    In the course of a concurrent computation, processes P1,..., Pn must reach a common choice of one out of k alternatives A 1,..., A k. They do this by protocols using k shared variables, one for each alternative. ...

    Michael O. Rabin in Acta Informatica (1982)

  19. No Access

    Chapter

    Solving Linear Equations by Means of Scalar Products

    We shall state and solve a problem proposed by R. Brent and P. Wolfe concerning the solution of a system of linear equations by algorithms where the only operation permitted on the coefficient vectors a1, a2, ......

    Michael O. Rabin in Complexity of Computer Computations (1972)

  20. No Access

    Article

    Real time computation

    We introduce a concept of real-time computation by a Turing machine. The relative strengths of one-tape versus two-tape machines is established by a new method of proofs of impossibility of actual computations.

    Michael O. Rabin in Israel Journal of Mathematics (1963)