• Publications
  • Influence
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
TLDR
Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described.
Broadcast Encryption
TLDR
Several schemes are presented that allow a center to broadcast a secret to any subset of privileged users out of a universe of size n so that coalitions of k users not in the privileged set cannot learn the secret.
Untraceable Electronic Cash
TLDR
An electronic cash protocol including the steps of using a one-way function f1 to generate an image f1 (x1) from a preimage x1 and receiving from the second party a note including a digital signature.
Zero-knowledge proofs of identity
TLDR
This paper defines the definition of unrestricted input zero- knowledge proofs of knowledge in which the prover demonstrates possession of knowledge without revealing any computational information whatsoever (not even the one bit revealed in zero-knowledge proofs of assertions).
Correlation clustering in general weighted graphs
TLDR
An O(log n)-approximation algorithm is given for the general case based on a linear-programming rounding and the "region-growing" technique for Kr, r-minor-free graphs and it is proved that this linear program has a gap of Ω( log n), and therefore the approximation is tight under this approach.
Tracing traitors
TLDR
This work gives cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties, in the context of pay television, where only paying customers should be able to view certain programs.
Optimal Search and One-Way Trading Online Algorithms
TLDR
It is shown that a simple threat-based strategy is optimal and its competitive ratio is determined which yields, for realistic values of the problem parameters, surprisingly low competitive ratios.
Highway dimension, shortest paths, and provably efficient algorithms
TLDR
The notion of highway dimension is introduced and it is shown how low highway dimension gives a unified explanation for several seemingly different algorithms.
On-line routing of virtual circuits with applications to load balancing and machine scheduling
TLDR
An algorithm is described that achieves on-line allocation of routes to virtual circuits (both point-to-point and multicast) with a constant competitive ratio with respect to maximum congestin, where n is the number of nodes in the network.
Competitive Paging Algorithms
TLDR
The marking algorithm is developed, a randomized on-line algorithm for the paging problem, which it is proved that its expected cost on any sequence of requests is within a factor of 2Hk of optimum.
...
1
2
3
4
5
...