Michael Oser Rabin
Michael Oser Rabin

Homepage
rabinatseas.harvard.edu

  Affiliation history
Bibliometrics: publication history
Average citations per article33.37
Citation Count1,902
Publication count57
Publication years1959-2014
Available for download18
Average downloads per article1,646.39
Downloads (cumulative)29,635
Downloads (12 Months)882
Downloads (6 Weeks)102
A. M. Turing Award Winner Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


57 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 57
Result page: 1 2 3

Sort by:

1 published by ACM
February 2014 Communications of the ACM: Volume 57 Issue 2, February 2014
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 20,   Downloads (12 Months): 147,   Downloads (Overall): 15,436

Full text available: HtmlHtml  PDFPDF
A solution to the persistent problem of preventing collusion in Vickrey auctions.

2
July 2012 ICALP'12: Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

Zero Knowledge Proofs (ZKPs) are one of the most striking innovations in theoretical computer science. In practice, the prevalent ZKP methods are, at times, too complicated to be useful for real-life applications. In this paper we present a practically efficient method for ZKPs which has a wide range applications. Specifically, ...

3 published by ACM
July 2012 ITiCSE '12: Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 42,   Downloads (Overall): 238

Full text available: PDFPDF
Computer science and technology innovated over the past sixty years, have revolutionized science, the economy and societal interactions. Inherently CS constitutes a new science combining mathematics, logic, information theory and electronics, on par with physics, chemistry and the life sciences. It is appropriate to educate students in the fundamentals of ...
Keywords: high school education

4
July 2009 Financial Cryptography and Data Security: 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The "clock phase" functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without ...

5
November 2008 Electronic Commerce Research and Applications: Volume 7 Issue 3, November, 2008
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 8

We present a practical protocol based on homomorphic cryptography for conducting provably fair sealed-bid auctions. The system preserves the secrecy of the bids, even after the announcement of auction results, while also providing for public verifiability of the correctness and trustworthiness of the outcome. No party, including the auctioneer, receives ...
Keywords: Cryptography, Electronic transactions, Auction theory, Auctions, Security, Cryptographic auctions, E-commerce, Homomorphic cryptography

6
September 2007 DISC '07: Proceedings of the 21st international symposium on Distributed Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the Limited Access model for enabling a simple and practical provably unbreakable encryption scheme. A voluntary distributed network of thousands of computers each maintain ...

7
September 2007 DISC'07: Proceedings of the 21st international conference on Distributed Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the Limited Access model for enabling a simple and practical provably unbreakable encryption scheme. A voluntary distributed network of thousands of computers each maintain ...

8
July 2007 LICS '07: Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5

We present a highly efficient method for proving correctness of computations while preserving secrecy of the input values. This is done in an Evaluator-Prover model which can also be realized by a secure processor. We describe an application to secure auctions.

9 published by ACM
January 2007 ACM Turing award lectures
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 23,   Downloads (12 Months): 198,   Downloads (Overall): 989

Full text available: PDFPDF
The framework for research in the theory of complexity of computations is described, emphasizing the interrelation between seemingly diverse problems and methods. Illustrative examples of practical and theoretical significance are given. Directions for new research are discussed.
Keywords: complexity theory, parsing, complexity of computations, intractable problems, probabilistic algorithms, algebraic complexity

10
September 2006 DISC'06: Proceedings of the 20th international conference on Distributed Computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Encryption is a fundamental building block for computer and communications technologies. Existing encryption methods depend for their security on unproven assumptions. We propose a new model, the Limited Access model for enabling a simple and practical provably unbreakable encryption scheme. A voluntary distributed network of thousands of computers each maintain ...

11 published by ACM
August 2006 ICEC '06: Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 3,   Downloads (12 Months): 13,   Downloads (Overall): 450

Full text available: PDFPDF
We present a practical system for conducting sealed-bid auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction. The auctioneer must accept all bids submitted and follow the published rules of the auction. No party receives any useful information about bids before ...

12
September 2004 SCN'04: Proceedings of the 4th international conference on Security in Communication Networks
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

We introduce and define the notion of identity-based zero-knowledge , concentrating on the non-interactive setting. In this setting, our notion allows any prover to widely disseminate a proof of a statement while protecting the prover from plagiarism in the following sense: although proofs are transferable (i.e., publicly verifiable), they are ...

13
October 2003 FOCS '03: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 50

We show how a polynomial-time prover can commit to an arbitrary finite set S of strings so that, later on, he can, for any string x, reveal with a proof whether x \in S or x \notin S, without revealing any knowledge beyond the verity of these membership assertions.Our method ...

14
May 2003 CIAC'03: Proceedings of the 5th Italian conference on Algorithms and complexity
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0


15
March 2002 STACS '02: Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 23

We present substantial extensions of works [1], [2], and all previous works, on encryption in the bounded storage model introduced by Maurer in [25]. The major new result is that the sharedsecret key employed by the sender Alice and the receiver Bob can be re-used to send an exponential number ...

16
June 2001 Journal of Computer and System Sciences: Volume 62 Issue 4, June 2001
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 7

We extend the notion of linearity testing to the task of checking linear consistency of multiple functions. Informally, functions are “linear” if their graphs form straight lines on the plane. Two such functions are “consistent” if the lines have the same slope. We propose a variant of a test of ...

17 published by ACM
July 2000 SPAA '00: Proceedings of the twelfth annual ACM symposium on Parallel algorithms and architectures
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 2,   Downloads (12 Months): 28,   Downloads (Overall): 523

Full text available: PDFPDF
We study the problem of executing parallel programs, in particular Cilk programs, on a collection of processors of different speeds. We consider a model in which each processor maintains an estimate of its own speed, where communication between processors has a cost, and where all scheduling must be online. This ...

18
October 1999 FOCS '99: Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 66

We efficiently combine unpredictability and verifiability by extending the Goldreich-Goldwasser-Micali construction of pseudorandom functions fs from a secret seed s, so that knowledge of s not only enables one to evaluate fs at any point x, but also to provide an NP-proof that the value fs(x) is indeed correct without ...
Keywords: pseudorandom functions, RSA, signature schemes

19
August 1999 CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 16

We provide a simple secret-key two-party secure communication scheme, which is provably information-theoretically secure in the limited-storage-space model. The limited-storage-space model postulates an eavesdropper who can execute arbitrarily complex computations, and is only limited in the total amount of storage space (not computation space) available to him. The bound on ...

20
August 1999 RANDOM-APPROX '99: Proceedings of the Third International Workshop on Approximation Algorithms for Combinatorial Optimization Problems: Randomization, Approximation, and Combinatorial Algorithms and Techniques
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1




The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us