Michael J. Fischer

Last updated

Michael John Fischer (born 1942) is an American computer scientist who works in the fields of distributed computing, parallel computing, cryptography, algorithms and data structures, and computational complexity.

Contents

Early life

Fischer was born in 1942 in Ann Arbor, Michigan, USA.

He received his BSc degree in mathematics from the University of Michigan in 1963. Fischer did his MA and PhD studies in applied mathematics at Harvard University; he received his MA degree in 1965 and PhD in 1968. Fischer's PhD supervisor at Harvard was Sheila Greibach.

Career

After receiving his PhD, Fischer was an assistant professor of computer science at Carnegie-Mellon University in 1968–1969, an assistant professor of mathematics at Massachusetts Institute of Technology (MIT) in 1969–1973, and an associate professor of electrical engineering at MIT in 1973–1975. At MIT he supervised doctoral students who became prominent computer scientists, including David S. Johnson, Frances Yao, and Michael Hammer.

In 1975, Fischer was nominated as a professor of computer science at the University of Washington. Since 1981, he has been a professor of computer science at Yale University, where his students included Rebecca N. Wright. Fischer served as the editor-in-chief of the Journal of the ACM in 1982–1986. [1] [2] He was inducted as a Fellow of the Association for Computing Machinery (ACM) in 1996. [3]

Work

Distributed computing

Fischer's 1985 work with Nancy A. Lynch and Michael S. Paterson [4] on consensus problems received the PODC Influential-Paper Award in 2001. [5] Their work showed that in an asynchronous distributed system, consensus is impossible if there is one processor that crashes. Jennifer Welch writes that “This result has had a monumental impact in distributed computing, both theory and practice. Systems designers were motivated to clarify their claims concerning under what circumstances the systems work.” [5]

Fischer was the program chairman of the first Symposium on Principles of Distributed Computing (PODC) in 1982; [6] nowadays, PODC is the leading conference in the field. In 2003, the distributed computing community honoured Fischer's 60th birthday by organising a lecture series during the 22nd PODC, [7] with Leslie Lamport, Nancy Lynch, Albert R. Meyer, and Rebecca Wright as speakers.

Parallel computing

In 1980, Fischer and Richard E. Ladner [8] presented a parallel algorithm for computing prefix sums efficiently. They show how to construct a circuit that computes the prefix sums; in the circuit, each node performs an addition of two numbers. With their construction, one can choose a trade-off between the circuit depth and the number of nodes. [9] However, the same circuit designs were already studied much earlier by Soviet mathematicians. [10] [11]

Algorithms and computational complexity

Fischer has done multifaceted work in theoretical computer science in general. Fischer's early work, including his PhD thesis, focused on parsing and formal grammars. [12] One of Fischer's most-cited works deals with string matching. [13] Already during his years at Michigan, Fischer studied disjoint-set data structures together with Bernard Galler. [14]

Cryptography

Fischer is one of the pioneers in electronic voting. In 1985, Fischer and his student Josh Cohen Benaloh [15] presented one of the first electronic voting schemes. [16]

Other contributions related to cryptography include the study of key exchange problems and a protocol for oblivious transfer. [16] In 1984, Fischer, Silvio Micali, and Charles Rackoff [17] presented an improved version of Michael O. Rabin's protocol for oblivious transfer.

Publications

Notes

  1. "Journal of the ACM (JACM), Volume 30, Issue 1 (January 1983)". ACM Portal. Retrieved 2009-07-06.
  2. "Journal of the ACM (JACM), Volume 33, Issue 3 (July 1986)". ACM Portal. Retrieved 2009-07-06.
  3. "ACM Fellows". ACM. Archived from the original on 2009-01-01. Retrieved 2009-07-06. "ACM: Fellows Award / Michael J Fischer". ACM. Retrieved 2009-07-06. "For outstanding technical contributions to theoretical computer science, and for dedicated service to the computer science community."
  4. Fischer, Lynch & Paterson (1985)
  5. 1 2 "PODC Influential Paper Award: 2001" . Retrieved 2009-07-06.
  6. "A chronological history of SIGOPS". ACM SIGOPS. Retrieved 2009-07-06.
  7. "Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC 2003), July 13-16, 2003, Boston, Massachusetts" . Retrieved 2009-07-06.
  8. Ladner & Fischer (1980).
  9. Harwood, Aaron (2003). "Ladner and Fischer's parallel prefix algorithm". Networks and Parallel Processing Complexity – Notes. Archived from the original on 2016-03-04. Retrieved 2009-07-07..
  10. Offman, Y. P. (1962). "On the Algorithmic Complexity of Discrete Functions". Dokl. Sov. Acad. Sci. (in Russian). 145 (1): 48–51.. English translation in Sov. Phys. Dokl.7 (7): 589–591 1963.
  11. Krapchenko, A. N. (1970). "Asymptotic Estimation of Addition Time of a Parallel Adder". Syst. Theory Res. 19: 105–122..
  12. 1 2 3 Meyer, Albert R. (12 July 2003). "M.J. Fischer, et al., the first decade: mid-60's to 70's" (PDF). Retrieved 2009-07-06. Slides from PODC 2003.
  13. Wagner & Fischer (1974).
  14. Galler & Fischer (1964)
  15. Cohen & Fischer (1985)
  16. 1 2 3 4 Wright, Rebecca N. (2003). "Fischer's cryptographic protocols". Proc. PODC 2003. pp. 20–22. doi:10.1145/872035.872039..
  17. Fischer, Micali & Rackoff (1996), originally presented in 1984.
  18. "1592 citations". Google Scholar. Retrieved 2009-07-06.
  19. "726 citations". Google Scholar. Retrieved 2009-07-07.
  20. PODC Influential-Paper Award in 2001.
  21. "2431 citations". Google Scholar. Retrieved 2009-07-06.

Related Research Articles

<span class="mw-page-title-main">Interactive proof system</span>

In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties: a prover and a verifier. The parties interact by exchanging messages in order to ascertain whether a given string belongs to a language or not. The prover possesses unlimited computational resources but cannot be trusted, while the verifier has bounded computation power but is assumed to be always honest. Messages are sent between the verifier and prover until the verifier has an answer to the problem and has "convinced" itself that it is correct.

<span class="mw-page-title-main">Leslie Lamport</span> American computer scientist and mathematician

Leslie B. Lamport is an American computer scientist and mathematician. Lamport is best known for his seminal work in distributed systems, and as the initial developer of the document preparation system LaTeX and the author of its first manual.

The Gödel Prize is an annual prize for outstanding papers in the area of theoretical computer science, given jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery Special Interest Group on Algorithms and Computational Theory. The award is named in honor of Kurt Gödel. Gödel's connection to theoretical computer science is that he was the first to mention the "P versus NP" question, in a 1956 letter to John von Neumann in which Gödel asked whether a certain NP-complete problem could be solved in quadratic or linear time.

<span class="mw-page-title-main">Shafi Goldwasser</span> Israeli American computer scientist

Shafrira Goldwasser is an Israeli-American computer scientist and winner of the Turing Award in 2012. She is the RSA Professor of Electrical Engineering and Computer Science at Massachusetts Institute of Technology; a professor of mathematical sciences at the Weizmann Institute of Science, Israel; the director of the Simons Institute for the Theory of Computing at the University of California, Berkeley; and co-founder and chief scientist of Duality Technologies.

<span class="mw-page-title-main">Silvio Micali</span> Italian-American computer scientist (born 1954)

Silvio Micali is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Computer Science and Artificial Intelligence Laboratory centers on cryptography and information security.

Nancy Ann Lynch is a computer scientist affiliated with the Massachusetts Institute of Technology. She is the NEC Professor of Software Science and Engineering in the EECS department and heads the "Theory of Distributed Systems" research group at MIT's Computer Science and Artificial Intelligence Laboratory.

<span class="mw-page-title-main">Shlomi Dolev</span>

Shlomi Dolev is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the BGU Negev Hi-Tech Faculty Startup Accelerator.

Charles Weill Rackoff is an American cryptologist. Born and raised in New York City, he attended MIT as both an undergraduate and graduate student, and earned a Ph.D. degree in Computer Science in 1974. He spent a year as a postdoctoral scholar at INRIA in France.

A fundamental problem in distributed computing and multi-agent systems is to achieve overall system reliability in the presence of a number of faulty processes. This often requires coordinating processes to reach consensus, or agree on some data value that is needed during computation. Example applications of consensus include agreeing on what transactions to commit to a database in which order, state machine replication, and atomic broadcasts. Real-world applications often requiring consensus include cloud computing, clock synchronization, PageRank, opinion formation, smart power grids, state estimation, control of UAVs, load balancing, blockchain, and others.

Secure two-party computation (2PC) a.k.a. Secure function evaluation is sub-problem of secure multi-party computation (MPC) that has received special attention by researchers because of its close relation to many cryptographic tasks. The goal of 2PC is to create a generic protocol that allows two parties to jointly compute an arbitrary function on their inputs without sharing the value of their inputs with the opposing party. One of the most well known examples of 2PC is Yao's Millionaires' problem, in which two parties, Alice and Bob, are millionaires who wish to determine who is wealthier without revealing their wealth. Formally, Alice has wealth , Bob has wealth , and they wish to compute without revealing the values or .

<span class="mw-page-title-main">Michael Luby</span> Information theorist and cryptographer

Michael George Luby is a mathematician and computer scientist, CEO of BitRipple, senior research scientist at the International Computer Science Institute (ICSI), former VP Technology at Qualcomm, co-founder and former chief technology officer of Digital Fountain. In coding theory he is known for leading the invention of the Tornado codes and the LT codes. In cryptography he is known for his contributions showing that any one-way function can be used as the basis for private cryptography, and for his analysis, in collaboration with Charles Rackoff, of the Feistel cipher construction. His distributed algorithm to find a maximal independent set in a computer network has also been influential.

A gossip protocol or epidemic protocol is a procedure or process of computer peer-to-peer communication that is based on the way epidemics spread. Some distributed systems use peer-to-peer gossip to ensure that data is disseminated to all members of a group. Some ad-hoc networks have no central registry and the only way to spread common data is to rely on each member to pass it along to their neighbors.

The ACM Symposium on Principles of Distributed Computing (PODC) is an academic conference in the field of distributed computing organised annually by the Association for Computing Machinery.

The Annual ACM Symposium on Theory of Computing (STOC) is an academic conference in the field of theoretical computer science. STOC has been organized annually since 1969, typically in May or June; the conference is sponsored by the Association for Computing Machinery special interest group SIGACT. Acceptance rate of STOC, averaged from 1970 to 2012, is 31%, with the rate of 29% in 2012.

<span class="mw-page-title-main">Cynthia Dwork</span> American computer scientist

Cynthia Dwork is an American computer scientist best known for her contributions to cryptography, distributed computing, and algorithmic fairness. She is one of the inventors of differential privacy and proof-of-work.

Verifiable computing enables a computer to offload the computation of some function, to other perhaps untrusted clients, while maintaining verifiable results. The other clients evaluate the function and return the result with a proof that the computation of the function was carried out correctly. The introduction of this notion came as a result of the increasingly common phenomenon of "outsourcing" computation to untrusted users in projects such as SETI@home and also to the growing desire to enable computationally-weak devices to outsource computational tasks to a more powerful computation service, as in cloud computing. The concept dates back to work by Babai et al., and has been studied under various terms, including "checking computations", "delegating computations", "certified computation", and verifiable computing. The term verifiable computing itself was formalized by Rosario Gennaro, Craig Gentry, and Bryan Parno, and echoes Micali's "certified computation".

<span class="mw-page-title-main">Tal Rabin</span> American cryptographer

Tal Rabin is a computer scientist and Professor of Computer and Information Science at the University of Pennsylvania. She was previously the head of research at the Algorand Foundation and the head of the cryptography research group at IBM's Thomas J. Watson Research Center.

Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. In the garbled circuit protocol, the function has to be described as a Boolean circuit.

Rachid Guerraoui is a Moroccan-Swiss computer scientist and a professor at the School of Computer and Communication Sciences at École Polytechnique Fédérale de Lausanne (EPFL), known for his contributions in the fields of concurrent and distributed computing. He is an ACM Fellow and the Chair in Informatics and Computational Science for the year 2018–2019 at Collège de France for distributed computing.