Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. Strauss is active.

Publication


Featured researches published by M. Strauss.


theory and application of cryptographic techniques | 1998

Divertible protocols and atomic proxy cryptography

Matt Blaze; Gerrit Bleumer; M. Strauss

First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a definition of protocol divertibility that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohtas definition in the case of interactive zero-knowledge proofs. Other important examples falling under the new definition are blind signature protocols. We propose a sufficiency criterion for divertibility that is satisfied by many existing protocols and which, surprisingly, generalizes to cover several protocols not normally associated with divertibility (e.g., Diffie-Hellman key exchange). Next, we introduce atomic proxy cryptography, in which an atomic proxy function, in conjunction with a public proxy key, converts ciphertexts (messages or signatures) for one key into ciphertexts for another. Proxy keys, once generated, may be made public and proxy functions applied in untrusted environments. We present atomic proxy functions for discrete-log-based encryption, identification, and signature schemes. It is not clear whether atomic proxy functions exist in general for all public-key cryptosystems. Finally, we discuss the relationship between divertibility and proxy cryptography.


Signal Processing | 2006

Algorithms for simultaneous sparse approximation: part I: Greedy pursuit

Joel A. Tropp; Anna C. Gilbert; M. Strauss

A simultaneous sparse approximation problem requests a good approximation of several input signals at once using different linear combinations of the same elementary signals. At the same time, the problem balances the error in approximation against the total number of elementary signals that participate. These elementary signals typically model coherent structures in the input signals, and they are chosen from a large, linearly dependent collection.The first part of this paper proposes a greedy pursuit algorithm, called simultaneous orthogonal matching pursuit (S-OMP), for simultaneous sparse approximation. Then it presents some numerical experiments that demonstrate how a sparse model for the input signals can be identified more reliably given several input signals. Afterward, the paper proves that the S-OMP algorithm can compute provably good solutions to several simultaneous sparse approximation problems.The second part of the paper develops another algorithmic approach called convex relaxation, and it provides theoretical results on the performance of convex relaxation for simultaneous sparse approximation.


international world wide web conferences | 1997

REFEREE: trust management for Web applications

Yang-Hua Chu; Joan Feigenbaum; Brian A. Lamacchia; Paul Resnick; M. Strauss

Abstract Digital signatures provide a mechanism for guaranteeing integrity and authenticity of Web content but not more general notions of security or trust. Web-aware applications must permit users to state clearly their own security policies and, of course, must provide the cryptographic tools for manipulating digital signatures. This paper describes the REFEREE trust management system for Web applications; REFEREE provides both a general policy-evaluation mechanism for Web clients and servers and a language for specifying trust policies. REFEREE places all trust decisions under explicit policy control; in the REFEREE model, every action, including evaluation of compliance with policy, happens under the control of some policy. That is, REFEREE is a system for writing policies about policies, as well as policies about cryptographic keys, PICS label bureaus, certification authorities, trust delegation, or anything else. In this paper, we flesh out the need for trust management in Web applications, explain the design philosophy of the REFEREE trust management system, and describe a prototype implementation of REFEREE.


allerton conference on communication, control, and computing | 2008

Combining geometry and combinatorics: A unified approach to sparse signal recovery

Radu Berinde; Anna C. Gilbert; Piotr Indyk; Howard J. Karloff; M. Strauss

There are two main algorithmic approaches to sparse signal recovery: geometric and combinatorial. The geometric approach utilizes geometric properties of the measurement matrix Phi. A notable example is the Restricted Isometry Property, which states that the mapping Phi preserves the Euclidean norm of sparse signals; it is known that random dense matrices satisfy this constraint with high probability. On the other hand, the combinatorial approach utilizes sparse matrices, interpreted as adjacency matrices of sparse (possibly random) graphs, and uses combinatorial techniques to recover an approximation to the signal. In this paper we present a unification of these two approaches. To this end, we extend the notion of Restricted Isometry Property from the Euclidean lscr2 norm to the Manhattan lscr1 norm. Then we show that this new lscr1 -based property is essentially equivalent to the combinatorial notion of expansion of the sparse graph underlying the measurement matrix. At the same time we show that the new property suffices to guarantee correctness of both geometric and combinatorial recovery algorithms. As a result, we obtain new measurement matrix constructions and algorithms for signal recovery which, compared to previous algorithms, are superior in either the number of measurements or computational efficiency of decoders.


financial cryptography | 1998

Compliance Checking in the PolicyMaker Trust Management System

Matt Blaze; Joan Feigenbaum; M. Strauss

Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that receives a signed request for action is forced to answer the central question “Is the key used to sign this request authorized to take this action?” In some services, this question reduces to “Does this key belong to this person?” In others, the authorization question is more complicated, and resolving it requires techniques for formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, and deferring trust to third parties. Blaze, Feigenbaum, and Lacy [1] identified this trust management problem as a distinct and important component of network services and described a general tool for addressing it, the PolicyMaker trust management system.


symposium on the theory of computing | 2007

One sketch for all: fast algorithms for compressed sensing

Anna C. Gilbert; M. Strauss; Joel A. Tropp; Roman Vershynin

Compressed Sensing is a new paradigm for acquiring the compressible signals that arise in many applications. These signals can be approximated using an amount of information much smaller than the nominal dimension of the signal. Traditional approaches acquire the entire signal and process it to extract the information. The new approach acquires a small number of nonadaptive linear measurements of the signal and uses sophisticated algorithms to determine its information content. Emerging technologies can compute these general linear measurements of a signal at unit cost per measurement. This paper exhibits a randomized measurement ensemble and a signal reconstruction algorithm that satisfy four requirements: 1. The measurement ensemble succeeds for all signals, with high probability over the random choices in its construction. 2. The number of measurements of the signal is optimal, except for a factor polylogarithmic in the signal length. 3. The running time of the algorithm is polynomial in the amount of information in the signal and polylogarithmic in the signal length. 4. The recovery algorithm offers the strongest possible type of error guarantee. Moreover, it is a fully polynomial approximation scheme with respect to this type of error bound. Emerging applications demand this level of performance. Yet no otheralgorithm in the literature simultaneously achieves all four of these desiderata.


symposium on the theory of computing | 2002

Near-optimal sparse fourier representations via sampling

Anna C. Gilbert; Sudipto Guha; Piotr Indyk; S. Muthukrishnan; M. Strauss

(MATH) We give an algorithm for finding a Fourier representation <b>R</b> of <i>B</i> terms for a given discrete signal signal <b>A</b> of length <i>N</i>, such that


2006 IEEE Dallas/CAS Workshop on Design, Applications, Integration and Software | 2006

Random Sampling for Analog-to-Information Conversion of Wideband Signals

Jason N. Laska; Sami Kirolos; Yehia Massoud; Richard G. Baraniuk; Anna C. Gilbert; Mark A. Iwen; M. Strauss

\|\signal-\repn\|_2^2


very large data bases | 2002

How to summarize the universe: dynamic maintenance of quantiles

Anna C. Gilbert; Yannis Kotidis; S. Muthukrishnan; M. Strauss

is within the factor (1 +ε) of best possible


ACM Transactions on Algorithms | 2006

Secure multiparty computation of approximations

Joan Feigenbaum; Yuval Ishai; T. A L Malkin; Kobbi Nissim; M. Strauss; Rebecca N. Wright

\|\signal-\repn_\opt\|_2^2

Collaboration


Dive into the M. Strauss's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joel A. Tropp

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yannis Kotidis

Athens University of Economics and Business

View shared research outputs
Top Co-Authors

Avatar

Piotr Indyk

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Mark A. Iwen

Michigan State University

View shared research outputs
Top Co-Authors

Avatar

Yi Li

University of Michigan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge