Publications

2026
Heli: Heavy-Light Private Aggregation
PDF GitHub
USENIX Security 2026
Resources
Abstract

This paper presents Heli, a system that lets a pair of servers collect aggregate statistics about private client-held data without learning anything more about any individual client's data. Like prior systems, Heli protects client privacy against a malicious server, protects correctness against misbehaving clients, and supports common statistical functions: average, variance, and more. Heli's innovation is that only one of the servers (the “heavy server”) needs to do per-run work proportional to the number of clients; the other server (the “light server”) does work sublinear in the number of clients, after a one-time setup phase. As a result, a computationally limited party, such as a low-budget non-profit, could potentially serve as the second server for a Heli deployment with millions of clients.

Heli relies on a new cryptographic primitive, aggregation-only encryption, that allows computing certain restricted functions on many clients’ encrypted data. In a deployment with ten million clients, in which the servers privately compute the sum of 32 client-held 1-bit integers, Heli's heavy server does 240,000 core-s of work and the light server does 7 core-ms of work. Compared with prior work, the heavy server does 38\( \times \) more computation, but the light server does 120,000\( \times \) less.

BibTeX
@inproceedings{LCDW26,
  author    = {Ryan Lehmkuhl and Henry Corrigan-Gibbs and Emma Dauterman and David J. Wu},
  title     = {Heli: Heavy-Light Private Aggregation},
  booktitle = {{USENIX} Security Symposium},
  year      = {2026}
}
Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model
PDF Slides
Brent Waters and David J. Wu
Eurocrypt 2026
Resources
Abstract

Threshold cryptography is a standard technique for distributing trust by splitting cryptographic keys into multiple shares held by different parties. The classic model of threshold cryptography assumes either that a trusted dealer distributes the shares to the different parties (and in doing so, also knows the overall secret) or that the users participate in an interactive distributed key-generation protocol to derive their individual shares. In recent years, several works have proposed a new model where users can independently choose a public key, and there is a public and deterministic function that derives the joint public key associated with a group of users from their individual keys. Schemes with this silent (i.e., non-interactive) setup procedure allow us to take advantage of the utility of threshold cryptography without needing to rely on a trusted dealer or an expensive interactive setup phase.

Existing works have primarily focused on threshold policies. This includes notions like threshold signatures (resp., encryption) with silent setup (where only quorums with at least \( T \) users can sign (resp., decrypt) a message) and distributed broadcast encryption (a special case of threshold encryption where the threshold is 1). Currently, constructions that support general threshold policies either rely on strong tools such as indistinguishability obfuscation and witness encryption, or analyze security in idealized models like the generic bilinear group model. The use of idealized models is due to the reliance on techniques for constructing succinct non-interactive arguments of knowledge (SNARKs).

In this work, we introduce a new pairing-based approach for constructing threshold signatures and encryption schemes with silent setup. On the one hand, our techniques directly allow us to support expressive policies like monotone Boolean formulas in addition to thresholds. On the other hand, we only rely on basic algebraic tools (i.e., a simple cross-term cancellation strategy), which yields constructions with shorter signatures and ciphertexts compared to previous pairing-based constructions. As an added bonus, we can also prove (static) security under \( q \)-type assumptions in the plain model. Concretely, the signature size in our distributed threshold signature scheme is 3 group elements and the ciphertext size in our distributed threshold encryption scheme is 4 group elements (together with a short tag).

BibTeX
@inproceedings{WW26,
  author    = {Brent Waters and David J. Wu},
  title     = {Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model},
  booktitle = {{EUROCRYPT}},
  year      = {2026}
}
Threshold Batched Identity-Based Encryption from Pairings in the Plain Model
PDF
Eurocrypt 2026
Resources
Abstract

In a batched identity-based encryption (IBE) scheme, ciphertexts are associated with a batch label \( \mathsf{tg}^\ast \) and an identity \( \mathsf{id}^\ast \) while secret keys are associated with a batch label \( \mathsf{tg} \) and a set of identities \( S \). Decryption is possible whenever \( \mathsf{tg} = \mathsf{tg}^\ast \) and \( \mathsf{id}^\ast \in S \). The primary efficiency property in a batched IBE scheme is that the size of the decryption key for a set \( S \) should be independent of the size of \( S \). Batched IBE schemes provide an elegant cryptographic mechanism to support encrypted memory pools in blockchain applications.

In this work, we introduce a new algebraic framework for building pairing-based batched IBE. Our framework gives the following:

  • First, we obtain a selectively-secure batched IBE scheme under a \( q \)-type assumption in the plain model. Both the ciphertext and the secret key consist of a constant number of group elements. This is the first pairing-based batched IBE scheme in the plain model. Previous pairing-based schemes relied on the generic group model and the random oracle model.

  • Next, we show how to extend our base scheme to a threshold batched IBE scheme with silent setup. In this setting, users independently choose their own public and private keys, and there is a non-interactive procedure to derive the master public key (for a threshold batched IBE scheme) for a group of users from their individual public keys. We obtain a statically-secure threshold batched IBE scheme with silent setup from a \( q \)-type assumption in the plain model. As before, ciphertexts and secret keys in this scheme contain a constant number of group elements. Previous pairing-based constructions of threshold batched IBE with silent setup relied on the generic group model, could only support a polynomial number of identities (where the size of the public parameters scaled linearly with this bound), and ciphertexts contained \( O(\lambda / \log \lambda) \) group elements, where \( \lambda \) is the security parameter.

  • Finally, we show that if we work in the generic group model, then we obtain a (threshold) batched IBE scheme with shorter ciphertexts (by 1 group element) than all previous pairing-based constructions (and without impacting the size of the secret key).

Our constructions rely on classic algebraic techniques underlying pairing-based IBE and do not rely on the signature-based witness encryption viewpoint taken in previous works.

BibTeX
@inproceedings{GWWW26,
  author    = {Junqing Gong and Brent Waters and Hoeteck Wee and David J. Wu},
  title     = {Threshold Batched Identity-Based Encryption from Pairings in the Plain Model},
  booktitle = {{EUROCRYPT}},
  year      = {2026}
}
Distributed Monotone-Policy Encryption for DNFs from Lattices
PDF
Jeffrey Champion and David J. Wu
Eurocrypt 2026
Resources
Abstract

Distributed monotone-policy encryption augments public-key encryption with fine-grained decryption capabilities in a trustless manner. In this scheme, users independently generate a public/private key-pair and post their public key to a public-key directory. Thereafter, anyone can encrypt a message to a set of public keys together with an access policy. Any set of users that satisfies the access policy can decrypt the ciphertext while the message should remain computationally hidden to any unsatisfying set of users. The primary efficiency requirement is succinctness: namely, the size of the ciphertext should be sublinear (or polylogarithmic) in the description length of the policy. Distributed monotone-policy encryption directly generalizes recent trustless cryptographic notions like threshold encryption with silent setup and distributed broadcast encryption.

In this work, we show how to construct distributed monotone-policy encryption for Boolean formulas in disjunctive normal form (DNF formulas) that supports an unbounded number of users. Security relies on the decomposed learning with errors (LWE) assumption, a simple and falsifiable lattice assumption, in the random oracle model. Previously, such a scheme was only known from plain witness encryption in the random oracle model. Our scheme has a transparent setup and the ciphertext size is \( \mathsf{poly}(\lambda, \log N) \), where \( N \) is the number of variables in the DNF formula.

BibTeX
@inproceedings{CW26,
  author    = {Jeffrey Champion and David J. Wu},
  title     = {Distributed Monotone-Policy Encryption for {DNFs} from Lattices},
  booktitle = {{EUROCRYPT}},
  year      = {2026}
}
Simultaneous-Message and Succinct Secure Computation: Reusable and Multiparty Protocols
Siddharth Agarwal, Abhishek Jain, Akshayaram Srinivasan, and David J. Wu
Eurocrypt 2026
Abstract

Recently, Boyle, Jain, Servan-Schreiber, and Srinivasan (EUROCRYPT’25) introduced the notion of simultaneous-message and succinct (SMS) secure computation. In an SMS protocol, after an initial sampling of a common reference string (CRS), two parties — Alice (with a large input) and Bob (with a small input) — can simultaneously exchange encodings of their private inputs and obtain additive shares of the output of a function evaluated over their inputs. The key requirement is succinctness: namely, the size of the CRS and each input encoding grows only poly-logarithmically in the size of Alice's input and the function output. Boyle et al., and independently Abram, Malavolta, and Roy (STOC’25), constructed SMS for all bounded-depth Boolean circuits from the plain learning with errors (LWE) assumption.

In this work, we extend the study of SMS along two new dimensions:

  • Reusable SMS: In this setting, the same input encodings can be reused to compute multiple functions.

  • Multiparty SMS: In the multiparty setting, we consider computations over one large input and multiple small inputs. Succinctness in this case means the size of the CRS and input encodings can grow with the total length of the small inputs (but polylogarithmically with the length of the long input and the size of the function output).

Assuming polynomial hardness of LWE (with a sub-exponential modulus-to-noise ratio), we construct reusable two-party SMS for all bounded-depth Boolean circuits with polylogarithmic communication. By additionally assuming indistinguishability obfuscation, we present a generic compiler from reusable two-party SMS to reusable multiparty SMS.

BibTeX
@inproceedings{AJSW26,
  author    = {Siddharth Agarwal and Abhishek Jain and Akshayaram Srinivasan and David J. Wu},
  title     = {Simultaneous-Message and Succinct Secure Computation: Reusable and Multiparty Protocols},
  booktitle = {{EUROCRYPT}},
  year      = {2026}
}
The Structured Generic-Group Model
PDF
Eurocrypt 2026
Resources
Abstract

This paper introduces the structured generic group model, an extension of Shoup's generic-group model (from Eurocrypt 1997) to capture algorithms that take advantage of some non-generic structure of the group. We show that any discrete-log algorithm in a group of prime order \( q \) that exploits the structure of at most a \( \delta \) fraction of group elements, in a way that we precisely define, must run in time \( \Omega(\min \{ \sqrt q, 1 / \delta\}) \). As an application, we prove a tight subexponential-time lower bound against discrete-log algorithms that exploit the multiplicative structure of smooth integers, but that are otherwise generic. This lower bound applies to a broad class of index-calculus algorithms. We prove similar lower bounds against algorithms that exploit the structure of small integers, smooth polynomials, and elliptic-curve points.

BibTeX
@inproceedings{CHW26,
  author    = {Henry Corrigan-Gibbs and Alexandra Henzinger and David J. Wu},
  title     = {The Structured Generic-Group Model},
  booktitle = {{EUROCRYPT}},
  year      = {2026}
}
2025
Succinct Witness Encryption for Batch Languages and Applications
PDF
Asiacrypt 2025
Resources
Abstract

Witness encryption allows one to encrypt a message to an \( \mathsf{NP} \) relation \( \mathcal{R} \) and a statement \( x \). The corresponding decryption key is any valid \( \mathsf{NP} \) witness \( w \). In a succinct witness encryption scheme, we require that the size of the ciphertext be sublinear in the size of the \( \mathsf{NP} \) relation. Currently, all realizations of succinct witness encryption for \( \mathsf{NP} \) rely on strong assumptions such as pseudorandom obfuscation, extractable witness encryption, or differing-inputs obfuscation. Notably, none of these notions are known from standard assumptions.

In this work, we consider a relaxation of succinct witness encryption for \( \mathsf{NP} \) to the setting of batch \( \mathsf{NP} \). In this setting, one encrypts to an \( \mathsf{NP} \) relation \( \mathcal{R} \) together with \( K \) statements \( x_1, \ldots, x_K \). In the basic version, one can decrypt if they have a witness \( w_1, \ldots, w_K \) for all \( K \) statements. The succinctness requirement is that the size of the ciphertext should be sublinear in the number of instances \( K \), but is allowed to grow with the size of the \( \mathsf{NP} \) relation (i.e., the size of a single instance). More generally, we can also impose a (monotone) policy \( P \colon \{0,1\}^K \to \{0,1\} \) over the \( K \) instances. In this case, decryption is possible only if there exists \( w_1, \ldots, w_K \) such that \( P(\mathcal{R}(x_1, w_1), \ldots, \mathcal{R}(x_K, w_K)) = 1 \).

In this work, we initiate a systematic study of succinct witness encryption for batch languages. We start with two simple constructions that support CNF and DNF policies based on plain witness encryption in conjunction with a somewhere statistically sound batch argument for \( \mathsf{NP} \) or a function-binding hash function. Then, using indistinguishability obfuscation, we show how to support policies that can be computed by read-once bounded-space Turing machines. The latter construction is in fact a unique witness map for monotone-policy batch \( \mathsf{NP} \), and as such, also gives a SNARG for monotone-policy batch \( \mathsf{NP} \) where the size of the common reference string is sublinear in the number of instances.

Finally, we demonstrate some immediate applications of succinct witness encryption for batch languages. We construct new succinct computational secret sharing schemes for CNFs, DNFs, and weighted threshold policies. We also show how to build distributed monotone-policy encryption, a notion that generalizes recent trustless primitives like distributed broadcast encryption and threshold encryption with silent setup.

BibTeX
@inproceedings{DJWW25,
  author    = {Lalita Devadas and Abhishek Jain and Brent Waters and David J. Wu},
  title     = {Succinct Witness Encryption for Batch Languages and Applications},
  booktitle = {{ASIACRYPT}},
  year      = {2025}
}
Pairing-Based Batch Arguments for NP with a Linear-Size CRS
PDF
Binyi Chen, Noel Elias, and David J. Wu
Asiacrypt 2025
Resources
Abstract

Non-interactive batch arguments (BARGs) for NP allow a prover to prove \( \ell \) NP statements with a proof whose size scales sublinearly with \( \ell \). In this work, we construct a pairing-based BARG where the size of the common reference string (CRS) scales linearly with the number of instances and the prover's computational overhead is quasi-linear in the number of instances. Our construction is fully black box in the use of the group. Security relies on a \( q \)-type assumption in composite-order pairing groups.

The best black-box pairing-based BARG prior to this work has a nearly-linear size CRS (i.e., a CRS of size \( \ell^{1 + o(1)} \)) and the prover overhead is quadratic in the number of instances. All previous pairing-based BARGs with a sublinear-size CRS relied on some type of recursive composition and correspondingly, non-black-box use of the group. The main technical insight underlying our construction is to substitute the vector commitment in previous pairing-based BARGs with a polynomial commitment. This yields a scheme that does not rely on cross terms in the common reference string. In previous black-box pairing-based schemes, the super-linear-size CRS and quadratic prover complexity was due to the need for cross terms.

BibTeX
@inproceedings{CEW25,
  author    = {Binyi Chen and Noel Elias and David J. Wu},
  title     = {Pairing-Based Batch Arguments for {NP} with a Linear-Size {CRS}},
  booktitle = {{ASIACRYPT}},
  year      = {2025}
}
Pairing-Based Aggregate Signatures without Random Oracles
PDF Slides
Susan Hohenberger, Brent Waters, and David J. Wu
Asiacrypt 2025
Resources
Abstract

An aggregate signature scheme allows a user to take \( N \) signatures from \( N \) users and aggregate them into a single short signature. One approach to aggregate signatures uses general-purpose tools like indistinguishability obfuscation or batch arguments for NP. These techniques are general, but lead to schemes with very high concrete overhead. On the practical end, the seminal work of Boneh, Gentry, Lynn and Shacham (EUROCRYPT 2003) give a simple and practical scheme, but in the random oracle model. In the plain model, current practical constructions either rely on interactive aggregation or impose restrictions on how signatures can be aggregated (e.g., same-message aggregation, same-signer aggregation or only support sequential or synchronized aggregation).

In this work, we focus on simple aggregate signatures in the plain model. We construct a pairing-based aggregate signature scheme that supports aggregating an a priori bounded number of signatures \( N \). The size of the aggregate signature is just two group elements. Security relies on the (bilateral) computational Diffie-Hellman (CDH) problem in a pairing group. To our knowledge, this is the first group-based aggregate signature in the plain model where (1) there is no restriction on what type of signatures can be aggregated; (2) the aggregated signature contains a constant number of group elements; and (3) security is based on static falsifiable assumptions in the plain model. The limitation of our scheme is that our scheme relies on a set of public parameters (whose size scales with \( N \)) and individual signatures (before aggregation) also have size that scale with \( N \). Essentially, individual signatures contain some additional hints to enable aggregation.

Our starting point is a new notion of slotted aggregate signatures. Here, each signature is associated with a “slot” and we only support aggregating signatures associated with distinct slots. We then show how to generically lift a slotted aggregate signature scheme into an standard aggregate signature scheme at the cost of increasing the size of the original signatures.

BibTeX
@inproceedings{HWW25,
  author    = {Susan Hohenberger and Brent Waters and David J. Wu},
  title     = {Pairing-Based Aggregate Signatures without Random Oracles},
  booktitle = {{ASIACRYPT}},
  year      = {2025}
}
The Pseudorandomness of Legendre Symbols under the Quadratic-Residuosity Assumption
PDF
Henry Corrigan-Gibbs and David J. Wu
TCC 2025
Resources
Abstract

The Legendre signature of an integer \( x \) modulo a prime \( p \) with respect to offsets \( \vec a = (a_1, \dots, a_\ell) \) is the string of Legendre symbols \( (\frac{x+a_1}{p}), \dots, (\frac{x+a_\ell}{p}) \). Under the quadratic-residuosity assumption, we show that the function that maps the pair \( (x,p) \) to the Legendre signature of \( x \) modulo \( p \), with respect to public random offsets \( \vec a \), is a pseudorandom generator. Our result applies to cryptographic settings in which the prime modulus \( p \) is secret; the result does not extend to the case — common in applications — in which the modulus \( p \) is public. At the same time, this paper is the first to relate the pseudorandomness of Legendre symbols to any pre-existing cryptographic assumption.

BibTeX
@inproceedings{CW25,
  author    = {Henry Corrigan-Gibbs and David J. Wu},
  title     = {The Pseudorandomness of {Legendre} Symbols under the {Quadratic-Residuosity} Assumption},
  booktitle = {{TCC}},
  year      = {2025}
}
A Hidden-Bits Approach to Statistical ZAPs from LWE
PDF
Eli Bradley, George Lu, Shafik Nassar, Brent Waters, and David J. Wu
TCC 2025
Resources
Abstract

We give a new approach for constructing statistical ZAP arguments (a two-message public-coin statistically witness indistinguishable argument) from quasi-polynomial hardness of the learning with errors (LWE) assumption with a polynomial modulus-to-noise ratio. Previously, all ZAP arguments from lattice-based assumptions relied on correlation-intractable hash functions. In this work, we present the first construction of a ZAP from LWE via the classic hidden-bits paradigm. Our construction matches previous lattice-based schemes by being public-coin and satisfying statistical witness indistinguishability.

BibTeX
@inproceedings{BLNWW25,
  author    = {Eli Bradley and George Lu and Shafik Nassar and Brent Waters and David J. Wu},
  title     = {A Hidden-Bits Approach to Black-Box Statistical {ZAPs} from {LWE}},
  booktitle = {{TCC}},
  year      = {2025}
}
Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE
PDF Video
Hoeteck Wee and David J. Wu
Crypto 2025
Resources
Abstract

We construct distributed broadcast encryption and registered attribute-based encryption (ABE) that support an arbitrary polynomial of users from the succinct LWE assumption. Specifically, if we take \( \lambda \) to be the security parameter and \( N \) to be the number of users, we obtain the following:

  • We obtain a distributed broadcast encryption scheme where the size of the public parameters, user public/secret keys, and ciphertexts are optimal (i.e., have size \( \mathsf{poly}(\lambda, \log N) \)). Security relies on the \( \mathsf{poly}(\lambda, \log N) \)-succinct LWE assumption. Previously, this was only known from indistinguishability obfuscation or witness encryption. All constructions that did not rely on these general tools could only support an a priori bounded number of users.

  • We obtain a key-policy registered ABE scheme that supports arbitrary bounded-depth Boolean circuit policies from the \( \mathsf{poly}(\lambda, d, \log N) \)-succinct LWE assumption in the random oracle model, where \( d \) is the depth of the circuit computing the policy. The public parameters, user public/secret keys, and ciphertexts have size \( \mathsf{poly}(\lambda, d, \log N) \), which are optimal up to the \( \mathsf{poly}(d) \) factor. This is the first registered ABE scheme with nearly-optimal parameters. All previous schemes (including constructions based on indistinguishability obfuscation, witness encryption, or evasive LWE) either have ciphertexts that scale with the policy size and attribute length, or can only support a bounded number of users (with long public parameters and public keys that scale with the number of users).

BibTeX
@inproceedings{WW25,
  author    = {Hoeteck Wee and David J. Wu},
  title     = {Unbounded Distributed Broadcast Encryption and Registered {ABE} from Succinct {LWE}},
  booktitle = {{CRYPTO}},
  year      = {2025}
}
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE
PDF Video
Jeffrey Champion, Yao-Ching Hsieh, and David J. Wu
Crypto 2025
Resources
Abstract

Registered attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control to encrypted data (like standard ABE), but without needing a central trusted authority. In a key-policy registered ABE scheme, users choose their own public and private keys and then register their public keys together with a decryption policy with an (untrusted) key curator. The key curator aggregates all of the individual public keys into a short master public key which serves as the public key for an ABE scheme.

Currently, we can build registered ABE for restricted policies (e.g., Boolean formulas) from pairing-based assumptions and for general policies using witness encryption or indistinguishability obfuscation. In this work, we construct a key-policy registered ABE for general policies (specifically, bounded-depth Boolean circuits) from the \( \ell \)-succinct learning with errors (LWE) assumption in the random oracle model. The ciphertext size in our registered ABE scheme is \( \mathsf{poly}(\lambda, d) \), where \( \lambda \) is a security parameter and \( d \) is the depth of the circuit that computes the policy circuit \( C \). Notably, this is independent of the length of the attribute \( \mathbf{x} \) and is optimal up to the \( \mathsf{poly}(d) \) factor.

Previously, the only lattice-based instantiation of registered ABE uses witness encryption, which relies on private-coin evasive LWE, a stronger assumption than \( \ell \)-succinct LWE. Moreover, the ciphertext size in previous registered ABE schemes that support general policies (i.e., from obfuscation or witness encryption) scales with \( \mathsf{poly}(\lambda, |\mathbf{x}|, |C|) \). The ciphertext size in our scheme depends only on the depth of the circuit (and not the length of the attribute or the size of the policy). This enables new applications to identity-based distributed broadcast encryption.

Our techniques are also useful for constructing adaptively-secure (distributed) broadcast encryption, and we give the first scheme from the \( \ell \)-succinct LWE assumption in the random oracle model. Previously, the only lattice-based broadcast encryption scheme with adaptive security relied on witness encryption in the random oracle model. All other lattice-based broadcast encryption schemes only achieved selective security.

BibTeX
@inproceedings{CHW25,
  author    = {Jeffrey Champion and Yao-Ching Hsieh and David J. Wu},
  title     = {Registered {ABE} and Adaptively-Secure Broadcast Encryption from Succinct {LWE}},
  booktitle = {{CRYPTO}},
  year      = {2025}
}
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP
PDF Video
Brent Waters and David J. Wu
Crypto 2025
Resources
Abstract

We construct an adaptively-sound succinct non-interactive argument (SNARG) for \( \mathsf{NP} \) in the CRS model from sub-exponentially-secure indistinguishability obfuscation (\( i\mathcal{O} \)) and sub-exponentially-secure one-way functions. Previously, Waters and Wu (STOC 2024), and subsequently, Waters and Zhandry (CRYPTO 2024) showed how to construct adaptively-sound SNARGs for NP by relying on sub-exponentially-secure indistinguishability obfuscation, one-way functions, and an additional algebraic assumption (i.e., discrete log, factoring, or learning with errors). In this work, we show that no additional algebraic assumption is needed and vanilla (sub-exponentially-secure) one-way functions already suffice in combination with \( i\mathcal{O} \).

BibTeX
@inproceedings{WW25,
  author    = {Brent Waters and David J. Wu},
  title     = {A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound {SNARGs} for {NP}},
  booktitle = {{CRYPTO}},
  year      = {2025}
}
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity
PDF Video
Shafik Nassar, Brent Waters, and David J. Wu
PKC 2025
Invited to Journal of Cryptology
Resources
Abstract

A tuple of NP statements \( (x_1, \ldots, x_k) \) satisfies a monotone policy \( P \colon \{0,1\}^k \to \{0,1\} \) if \( P(b_1,\ldots,b_k)=1 \), where \( b_i = 1 \) if and only if \( x_i \) is in the NP language. A monotone-policy batch argument (monotone-policy BARG) for NP is a natural extension of regular batch arguments (BARGs) that allows a prover to prove that \( x_1, \ldots, x_k \) satisfy a monotone policy \( P \) with a proof of size \( \mathsf{poly}(\lambda, |\mathcal{R}|, \log k) \), where \( |\mathcal{R}| \) is the size of the Boolean circuit computing the NP relation \( \mathcal{R} \).

Previously, Brakerski, Brodsky, Kalai, Lombardi, and Paneth (CRYPTO 2023) and Nassar, Waters, and Wu (TCC 2024) showed how to construct monotone-policy BARGs from (somewhere-extractable) BARGs for NP together with a leveled homomorphic encryption scheme (Brakerski et al.) or an additively homomorphic encryption scheme over a sufficiently-large group (Nassar et al.). In this work, we improve upon both works by showing that BARGs together with additively homomorphic encryption over any group suffices (e.g., over \( \mathbb{Z}_2 \)). For instance, we can instantiate the additively homomorphic encryption with the classic Goldwasser-Micali encryption scheme based on the quadratic residuosity (QR) assumption. Then, by appealing to existing compilers, we also obtain a monotone-policy aggregate signature scheme from any somewhere extractable BARG and the QR assumption.

BibTeX
@inproceedings{NWW25,
  author    = {Shafik Nassar and Brent Waters and David J. Wu},
  title     = {Monotone-Policy {BARGs} and More from {BARGs} and Quadratic Residuosity},
  booktitle = {{PKC}},
  year      = {2025}
}
Adaptively-Secure Big-Key Identity-Based Encryption
PDF Video
Jeffrey Champion, Brent Waters, and David J. Wu
PKC 2025
Resources
Abstract

Key-exfiltration attacks on cryptographic keys are a significant threat to computer security. One proposed defense against such attacks is big-key cryptography which seeks to make cryptographic secrets so large that it is infeasible for an adversary to exfiltrate the key (without being detected). However, this also introduces an inconvenience to the user who must now store the large key on all of their different devices. The work of Döttling, Garg, Sekar and Wang (TCC 2022) introduces an elegant solution to this problem in the form of big-key identity-based encryption (IBE). Here, there is a large master secret key, but very short identity keys. The user can now store the large master secret key as her long-term key, and can provision each of her devices with short ephemeral identity keys (say, corresponding to the current date). In this way, the long-term secret key is protected by conventional big-key cryptography, while the user only needs to distribute short ephemeral keys to their different devices. Döttling et al. introduce and construct big-key IBE from standard pairing-based assumptions. However, their scheme only satisfies selective security where the adversary has to declare its challenge set of identities at the beginning of the security game. The more natural notion of security is adaptive security where the user can adaptively choose which identities it wants to challenge after seeing the public parameters (and part of the master secret key).

In this work, we give the first adaptively-secure construction of big-key IBE from standard cryptographic assumptions. Our first construction relies on indistinguishability obfuscation (and one-way functions), while our second construction relies on witness encryption for NP together with standard pairing-based assumptions (i.e., the SXDH assumption). To prove adaptive security, we show how to implement the classic dual-system methodology with indistinguishability obfuscation as well as witness encryption.

BibTeX
@inproceedings{CWW25,
  author    = {Jeffrey Champion and Brent Waters and David J. Wu},
  title     = {Adaptively-Secure Big-Key Identity-Based Encryption},
  booktitle = {{PKC}},
  year      = {2025}
}
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE
PDF Video
Brent Waters, Hoeteck Wee, and David J. Wu
Eurocrypt 2025
Resources
Abstract

Recent constructions of vector commitments and non-interactive zero-knowledge (NIZK) proofs from LWE implicitly solve the following shifted multi-preimage sampling problem: given matrices \( \mathbf{A}_1, \ldots, \mathbf{A}_\ell \in \mathbb{Z}_q^{n \times m} \) and targets \( \mathbf{t}_1, \ldots, \mathbf{t}_\ell \in \mathbb{Z}_q^n \), sample a shift \( \mathbf{c} \in \mathbb{Z}_q^n \) and short preimages \( \boldsymbol{\pi}_1, \ldots, \boldsymbol{\pi}_\ell \in \mathbb{Z}_q^m \) such that \( \mathbf{A}_i \boldsymbol{\pi}_i = \mathbf{t}_i + \mathbf{c} \) for all \( i \in [\ell] \). In this work, we introduce a new technique for sampling \( \mathbf{A}_1, \ldots, \mathbf{A}_\ell \) together with a succinct public trapdoor for solving the multi-preimage sampling problem with respect to \( \mathbf{A}_1, \ldots, \mathbf{A}_\ell \). This enables the following applications:

  • We provide a dual-mode instantiation of the hidden-bits model (and by correspondence, a dual-mode NIZK proof for \( \mathsf{NP} \)) with (1) a linear-size common reference string (CRS); (2) a transparent setup in hiding mode (which yields statistical NIZK arguments); and (3) hardness from LWE with a polynomial modulus-to-noise ratio. This improves upon the work of Waters (STOC 2024) which required a quadratic-size structured reference string (in both modes) and LWE with a super-polynomial modulus-to-noise ratio.

  • We give a statistically-hiding vector commitment with transparent setup and polylogarithmic-size CRS, commitments, and openings from SIS. This simultaneously improves upon the vector commitment schemes of de Castro and Peikert (EUROCRYPT 2023) as well as Wee and Wu (EUROCRYPT 2023).

At a conceptual level, our work provides a unified view of recent lattice-based vector commitments and hidden-bits model NIZKs through the lens of the shifted multi-preimage sampling problem.

BibTeX
@inproceedings{WWW25,
  author    = {Brent Waters and Hoeteck Wee and David J. Wu},
  title     = {New Techniques for Preimage Sampling: Improved {NIZKs} and More from {LWE}},
  booktitle = {{EUROCRYPT}},
  year      = {2025}
}
A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model
PDF Video
Yao-Ching Hsieh, Brent Waters, and David J. Wu
Eurocrypt 2025
Resources
Abstract

Broadcast encryption allows a user to encrypt a message to \( N \) recipients with a ciphertext whose size scales sublinearly with \( N \). The natural security notion for broadcast encryption is adaptive security which allows an adversary to choose the set of recipients after seeing the public parameters. Achieving adaptive security in broadcast encryption is challenging, and in the plain model, the primary technique is the celebrated dual-systems approach, which can be implemented over groups with bilinear maps. Unfortunately, it has been challenging to replicate the dual-systems approach in other settings (e.g., with lattices or witness encryption). Moreover, even if we focus on pairing-based constructions, the dual-systems framework critically relies on decisional (and source-group) assumptions. We do not have constructions of adaptively-secure broadcast encryption from search (or target-group) assumptions in the plain model.

Gentry and Waters (EUROCRYPT 2009) described a compiler that takes any semi-statically-secure broadcast encryption scheme and transforms it into an adaptively-secure scheme in the random oracle model. While semi-static security is easier to achieve and constructions are known from witness encryption as well as search (and target-group) assumptions on pairing groups, the transformed scheme relies on random oracles. In this work, we show that using publicly-sampleable projective PRGs, we can achieve adaptive security in the plain model. We then show how to build publicly-sampleable projective PRGs from many standard number-theoretic assumptions (e.g., CDH, LWE, RSA).

Our compiler yields the first adaptively-secure broadcast encryption scheme from search assumptions as well as the first such scheme from witness encryption in the plain model. We also obtain the first adaptively-secure pairing-based scheme in the plain model with \( O_\lambda(N) \)-size public keys and \( O_\lambda(1) \)-size ciphertexts (where \( O_\lambda(\cdot) \) suppresses polynomial factors in the security parameter \( \lambda \)). Previous adaptively-secure pairing-based schemes in the plain model with \( O_\lambda(1) \)-size ciphertexts required \( O_\lambda(N^2) \)-size public keys.

BibTeX
@inproceedings{HWW25,
  author    = {Yao-Ching Hsieh and Brent Waters and David J. Wu},
  title     = {A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model},
  booktitle = {{EUROCRYPT}},
  year      = {2025}
}
Multi-Authority Registered Attribute-Based Encryption
PDF Video
George Lu, Brent Waters, and David J. Wu
Eurocrypt 2025
Resources
Abstract

Registered attribute-based encryption (ABE) enables fine-grained access control to encrypted data without a trusted authority. In this model, users generate their own public keys and register their public key along with a set of attributes with a key curator. The key curator aggregates the public keys into a short master public key that functions as the public key for an ABE scheme.

A limitation of ABE (registered or centralized) is the assumption that a single entity manages all of the attributes in a system. In many settings, the attributes belong to different organizations, making it unrealistic to expect that a single entity manage all of them. In the centralized setting, this motivated the notion of multi-authority ABE, where multiple independent authorities control their individual set of attributes. Access policies are then defined over attributes across multiple authorities.

In this work, we introduce multi-authority registered ABE, where multiple (independent) key curators each manage their individual sets of attributes. Users can register their public keys with any key curator, and access policies can be defined over attributes from multiple key curators. Multi-authority registered ABE combines the trustless nature of registered ABE with the decentralized nature of multi-authority ABE.

We start by constructing a multi-authority registered ABE scheme from composite-order pairing groups. This scheme supports an a priori bounded number of users and access policies that can be represented by a linear secret sharing scheme (which includes monotone Boolean formulas). Our construction relies on a careful integration of ideas from pairing-based registered ABE and multi-authority ABE schemes. We also construct a multi-authority registered ABE scheme that supports an unbounded number of users and arbitrary monotone policies using indistinguishability obfuscation (and function-binding hash functions).

BibTeX
@inproceedings{LWW25,
  author    = {George Lu and Brent Waters and David J. Wu},
  title     = {Multi-Authority Registered Attribute-Based Encryption},
  booktitle = {{EUROCRYPT}},
  year      = {2025}
}
2024
Distributed Broadcast Encryption from Lattices
PDF Video
Jeffrey Champion and David J. Wu
TCC 2024
Resources
Abstract

A broadcast encryption scheme allows a user to encrypt a message to \( N \) recipients with a ciphertext whose size scales sublinearly with \( N \). While broadcast encryption enables succinct encrypted broadcasts, it also introduces a strong trust assumption and a single point of failure; namely, there is a central authority who generates the decryption keys for all users in the system. Distributed broadcast encryption offers an appealing alternative where there is a one-time (trusted) setup process that generates a set of public parameters. Thereafter, users can independently generate their own public keys and post them to a public-key directory. Moreover, anyone can broadcast an encrypted message to any subset of user public keys with a ciphertext whose size scales sublinearly with the size of the broadcast set. Unlike traditional broadcast encryption, there are no long-term secrets in distributed broadcast encryption and users can join the system at any time (by posting their public key to the public-key directory).

Previously, distributed broadcast encryption schemes were known from standard pairing-based assumptions or from powerful tools like indistinguishability obfuscation or witness encryption. In this work, we provide the first distributed broadcast encryption scheme from a falsifiable lattice assumption. Specifically, we rely on the \( \ell \)-succinct learning with errors (LWE) assumption introduced by Wee (CRYPTO 2024). Previously, the only lattice-based candidate for distributed broadcast encryption goes through general-purpose witness encryption, which in turn is only known from the private-coin evasive LWE assumption, a strong and non-falsifiable lattice assumption. Along the way, we also describe a more direct construction of broadcast encryption from lattices that does not rely on any homomorphic evaluation machinery.

BibTeX
@inproceedings{CW24,
  author    = {Jeffrey Champion and David J. Wu},
  title     = {Distributed Broadcast Encryption from Lattices},
  booktitle = {{TCC}},
  year      = {2024}
}
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
PDF Video
Shafik Nassar, Brent Waters, and David J. Wu
TCC 2024
Resources
Abstract

A monotone policy batch \( \mathsf{NP} \) language \( \mathcal{L}_{\mathcal{R}, P} \) is parameterized by a monotone policy \( P \colon \{0,1\}^k \to \{0,1\} \) and an \( \mathsf{NP} \) relation \( \mathcal{R} \). A statement \( (x_1, \ldots, x_k) \) is a yes instance if there exists \( w_1, \ldots, w_k \) where \( P(\mathcal{R}(x_1, w_1), \ldots, \mathcal{R}(x_k, w_k)) = 1 \). For example, we might say that an instance \( (x_1, \ldots, x_k) \) is a yes instance if a majority of the statements are true. A monotone policy batch argument (BARG) for \( \mathsf{NP} \) allows a prover to prove that \( (x_1, \ldots, x_k) \in \mathcal{L}_{\mathcal{R}, P} \) with a proof of size \( \mathsf{poly}(\lambda, |\mathcal{R}|, \log k) \), where \( \lambda \) is the security parameter, \( |\mathcal{R}| \) is the size of the Boolean circuit that computes \( \mathcal{R} \), and \( k \) is the number of instances. Recently, Brakerski, Brodsky, Kalai, Lombardi, and Paneth (CRYPTO 2023) gave the first monotone policy BARG for \( \mathsf{NP} \) from the learning with errors (LWE) assumption.

In this work, we describe a generic approach for constructing monotone policy BARGs from any BARG for \( \mathsf{NP} \) together with an additively homomorphic encryption scheme. This yields the first constructions of monotone policy BARGs from the \( k \)-Lin assumption in prime-order pairing groups as well as the (subexponential) DDH assumption in pairing-free groups. Central to our construction is a notion of a zero-fixing hash function, which is a relaxed version of a predicate-extractable hash function from the work of Brakerski et al. Our relaxation enables a direct realization of zero-fixing hash functions from BARGs for \( \mathsf{NP} \) and additively homomorphic encryption, whereas the previous notion relied on leveled homomorphic encryption, and by extension, the LWE assumption.

BibTeX
@inproceedings{NWW24,
  author    = {Shafik Nassar and Brent Waters and David J. Wu},
  title     = {Monotone Policy {BARGs} from {BARGs} and Additively Homomorphic Encryption},
  booktitle = {{TCC}},
  year      = {2024}
}
Batching Adaptively-Sound SNARGs for NP
PDF Video
Lalita Devadas, Brent Waters, and David J. Wu
TCC 2024
Resources
Abstract

A succinct non-interactive argument (SNARG) for NP allows a prover to convince a verifier that an NP statement \( x \) is true with a proof whose size is sublinear in the length of the traditional NP witness. Moreover, a SNARG is adaptively sound if the adversary can choose the statement it wants to prove after seeing the scheme parameters. Very recently, Waters and Wu (STOC 2024) showed how to construct adaptively-sound SNARGs for NP in the plain model from falsifiable assumptions (specifically, sub-exponentially-secure indistinguishability obfuscation, sub-exponentially-secure one-way functions, and polynomial hardness of discrete log).

We consider the batch setting where the prover wants to prove a collection of \( T \) statements \( x_1, \ldots, x_T \) and its goal is to construct a proof whose size is sublinear in both the size of a single witness and the number of instances \( T \). In this setting, existing constructions either require the size of the public parameters to scale linearly with \( T \) (and thus, can only support an a priori bounded number of instances), or only provide non-adaptive soundness, or have proof size that scales linearly with the size of a single NP witness. In this work, we give two approaches for batching adaptively-sound SNARGs for NP, and in particular, show that under the same set of assumptions as those underlying the Waters-Wu adaptively-sound SNARG, we can obtain an adaptively-sound SNARG for batch NP where the size of the proof is \( \mathsf{poly}(\lambda) \) and the size of the CRS is \( \mathsf{poly}(\lambda + |C|) \), where \( \lambda \) is a security parameter and \( |C| \) is the size of the circuit that computes the associated NP relation.

Our first approach builds directly on top of the Waters-Wu construction and relies on indistinguishability obfuscation and a homomorphic re-randomizable one-way function. Our second approach shows how to combine ideas from the Waters-Wu SNARG with the chaining-based approach by Garg, Sheridan, Waters, and Wu (TCC 2022) to obtain a SNARG for batch NP.

BibTeX
@inproceedings{DWW24,
  author    = {Lalita Devadas and Brent Waters and David J. Wu},
  title     = {Batching Adaptively-Sound {SNARGs} for {NP}},
  booktitle = {{TCC}},
  year      = {2024}
}
Batch Arguments to NIZKs from One-Way Functions
PDF Video
Eli Bradley, Brent Waters, and David J. Wu
TCC 2024
Resources
Abstract

Succinctness and zero-knowledge are two fundamental properties in the study of cryptographic proof systems. Several recent works have formalized the connections between these two notions by showing how to realize non-interactive zero-knowledge (NIZK) arguments from succinct non-interactive arguments. Specifically, Champion and Wu (CRYPTO 2023) as well as Bitansky, Kamath, Paneth, Rothblum, and Vasudevan (ePrint 2023) recently showed how to construct a NIZK argument for NP from a (somewhere-sound) non-interactive batch argument (BARG) and a dual-mode commitment scheme (and in the case of the Champion-Wu construction, a local pseudorandom generator). The main open question is whether a BARG suffices for a NIZK (just assuming one-way functions).

In this work, we first show that an adaptively-sound BARG for NP together with an one-way function imply a computational NIZK argument for NP. We then show that the weaker notion of somewhere soundness achieved by existing BARGs from standard algebraic assumptions are also adaptively sound if we assume sub-exponential security. This transformation may also be of independent interest. Taken together, we obtain a NIZK argument for NP from one-way functions and a sub-exponentially-secure somewhere-sound BARG for NP.

If we instead assume plain public-key encryption, we show that a standard polynomially-secure somewhere-sound batch argument for NP suffices for the same implication. As a corollary, this means a somewhere-sound BARG can be used to generically upgrade any semantically-secure public-key encryption scheme into one secure against chosen-ciphertext attacks. More broadly, our results demonstrate that constructing non-interactive batch arguments for NP is essentially no easier than constructing NIZK arguments for NP. is essentially no easier than constructing NIZK arguments for NP.

BibTeX
@inproceedings{BWW24,
  author    = {Eli Bradley and Brent Waters and David J. Wu},
  title     = {Batch Arguments to {NIZKs} from One-Way Functions},
  booktitle = {{TCC}},
  year      = {2024}
}
Dot-Product Proofs and Their Applications
PDF Video
FOCS 2024
Invited to SIAM Journal of Computing (SICOMP) Special Issue
Resources
Abstract

A dot-product proof (DPP) is a simple probabilistic proof system in which the input statement \( \mathbf{x} \) and the proof \( \boldsymbol{\pi} \) are vectors over a finite field \( \mathbb{F} \), and the proof is verified by making a single dot-product query \( \langle \mathbf{q}, (\mathbf{x} \| \boldsymbol{\pi}) \rangle \) jointly to \( \mathbf{x} \) and \( \boldsymbol{\pi} \). A DPP can be viewed as a 1-query fully linear PCP. We study the feasibility and efficiency of DPPs, obtaining the following results:

  • Small-field DPP. For any finite field \( \mathbb{F} \) and Boolean circuit \( C \) of size \( S \), there is a DPP for proving that there exists \( \mathbf{w} \) such that \( C(\mathbf{x}, \mathbf{w})=1 \) with a proof \( \boldsymbol{\pi} \) of length \( S\cdot\mathsf{poly}(|\mathbb{F}|) \) and soundness error \( \varepsilon=O(1 / \sqrt{|\mathbb{F}|}) \). We show this error to be asymptotically optimal. In particular, and in contrast to the best known PCPs, there exist strictly linear-length DPPs over constant-size fields.

  • Large-field DPP. If \( |\mathbb{F}|\ge\mathsf{poly}(S / \varepsilon) \), there is a similar DPP with soundness error \( \varepsilon \) and proof length \( O(S) \) (in field elements).

The above results do not rely on the PCP theorem and their proofs are considerably simpler. We apply our DPP constructions toward two kinds of applications.

  • Hardness of approximation. We obtain a simple proof for the NP-hardness of approximating MAXLIN (with dense instances) over any finite field \( \mathbb{F} \) up to some constant factor \( c\gt1 \), independent of \( \mathbb{F} \). Unlike previous PCP-based proofs, our proof yields exponential-time hardness under the exponential time hypothesis (ETH).

  • Succinct arguments. We improve the concrete efficiency of succinct interactive arguments in the generic group model using input-independent preprocessing. In particular, the communication is comparable to sending two group elements and the verifier's computation is dominated by a single group exponentiation. We also show how to use DPPs together with linear-only encryption to construct succinct commit-and-prove arguments.

BibTeX
@inproceedings{BHIRW24,
  author    = {Nir Bitansky and Prahladh Harsha and Yuval Ishai and Ron D. Rothblum and David J. Wu},
  title     = {Dot-Product Proofs and Their Applications},
  booktitle = {{FOCS}},
  year      = {2024}
}
Respire: High-Rate PIR for Databases with Small Records
PDF GitHub
Alexander Burton, Samir Jordan Menon, and David J. Wu
CCS 2024
Resources
Abstract

Private information retrieval (PIR) is a key building block in many privacy-preserving systems, and recent works have made significant progress on reducing the concrete computational costs of single-server PIR. However, existing constructions have high communication overhead, especially for databases with small records. In this work, we introduce Respire, a lattice-based PIR scheme tailored for databases of small records. To retrieve a single record from a database with over a million 256-byte records, the Respire protocol requires just 6.1 KB of online communication; this is a \( 5.9\times \) reduction compared to the best previous lattice-based scheme. Moreover, Respire naturally extends to support batch queries. Compared to previous communication-efficient batch PIR schemes, Respire achieves a \( 3.4 \)-\( 7.1\times \) reduction in total communication while maintaining comparable throughput (200-400 MB/s). The design of Respire relies on new query compression and response packing techniques based on ring switching in homomorphic encryption.

BibTeX
@inproceedings{BMW24,
  author    = {Alexander Burton and Samir Jordan Menon and David J. Wu},
  title     = {\textsc{Respire}: High-Rate {PIR} for Databases with Small Records},
  booktitle = {{ACM} {CCS}},
  year      = {2024}
}
Reducing the CRS Size in Registered ABE Systems
PDF Video
Rachit Garg, George Lu, Brent Waters, and David J. Wu
Crypto 2024
Resources
Abstract

Attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control to encrypted data. In (ciphertext-policy) ABE, a central trusted authority issues decryption keys for attributes \( x \) to users. In turn, ciphertexts are associated with a decryption policy \( \mathcal{P} \). Decryption succeeds and recovers the encrypted message whenever \( \mathcal{P}(x) = 1 \). Recently, Hohenberger, Lu, Waters, and Wu (Eurocrypt 2023) introduced the notion of registered ABE, which is an ABE scheme without a trusted central authority. Instead, users generate their own public/secret keys (just like in public-key encryption) and then register their keys (and attributes) with a key curator. The key curator is a transparent and untrusted entity.

Currently, the best pairing-based registered ABE schemes support monotone Boolean formulas and an a priori bounded number of users \( L \). A major limitation of existing schemes is that they require a (structured) common reference string (CRS) of size \( L^2 \cdot |\mathcal{U}| \) where \( |\mathcal{U}| \) is the size of the attribute universe. In other words, the size of the CRS scales quadratically with the number of users and multiplicatively with the size of the attribute universe. The large CRS makes these schemes expensive in practice and limited to a small number of users and a small universe of attributes.

In this work, we give two ways to reduce the CRS size in pairing-based registered ABE schemes. First, we introduce a combinatoric technique based on progression-free sets that enables registered ABE for the same class of policies but with a CRS whose size is sub-quadratic in the number of users. Asymptotically, we obtain a scheme where the CRS size is nearly linear in the number of users \( L \) (i.e., \( L^{1 + o(1)} \)). If we take a more concrete-efficiency-oriented focus, we can instantiate our framework to obtain a construction with a CRS of size \( L^{\log_2 3} \approx L^{1.6} \). For instance, in a scheme for 100,000 users, our approach reduces the CRS by a factor of over \( 115\times \) compared to previous approaches (and without incurring any overhead in encryption/decryption time). Our second approach for reducing the CRS size is to rely on a partitioning-based argument when arguing security of the registered ABE scheme. Previous approaches took a dual-system approach. Using a partitioning-based argument yields a registered ABE scheme where the size of the CRS is independent of the size of the attribute universe. The cost is the resulting scheme satisfies a weaker notion of static security. Our techniques for reducing the CRS size can be combined, and taken together, we obtain a pairing-based registered ABE scheme that supports monotone Boolean formulas with a CRS size of \( L^{1 + o(1)} \). Notably, this is the first pairing-based registered ABE scheme that does not require imposing a bound on the size of the attribute universe during setup time.

As an additional application, we also show how to apply our techniques based on progression-free sets to the batch argument (BARG) for \( \mathsf{NP} \) scheme of Waters and Wu (Crypto 2022) to obtain a scheme with a nearly-linear CRS without needing to rely on non-black-box bootstrapping techniques.

BibTeX
@inproceedings{GLWW24,
  author    = {Rachit Garg and George Lu and Brent Waters and David J. Wu},
  title     = {Reducing the {CRS} Size in Registered {ABE} Systems},
  booktitle = {{CRYPTO}},
  year      = {2024}
}
The One-Wayness of Jacobi Signatures
PDF Video
Henry Corrigan-Gibbs and David J. Wu
Crypto 2024
Resources
Abstract

We show that under a mild number-theoretic conjecture, recovering an integer from its Jacobi signature modulo \( N = p^2 q \), for primes \( p \) and \( q \), is as hard as factoring \( N \). This relates, for the first time, the one-wayness of a pseudorandom generator that Damgård proposed in 1988, to a standard number-theoretic problem. In addition, we show breaking the Jacobi pseudorandom function is no harder than factoring.

BibTeX
@inproceedings{CW24,
  author    = {Henry Corrigan-Gibbs and David J. Wu},
  title     = {The One-Wayness of Jacobi Signatures},
  booktitle = {{CRYPTO}},
  year      = {2024}
}
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing
PDF Video GitHub
Samir Jordan Menon and David J. Wu
USENIX Security 2024
Resources
Abstract

We introduce YPIR, a single-server private information retrieval (PIR) protocol that achieves high throughput (up to 83% of the memory bandwidth of the machine) without any offline communication. For retrieving a 1-bit (or 1-byte) record from a 32 GB database, YPIR achieves 12.1 GB/s/core server throughput and requires 2.5 MB of total communication. On the same setup, the state-of-the-art SimplePIR protocol achieves a 12.5 GB/s/core server throughput, requires 1.5 MB total communication, but additionally requires downloading a 724 MB hint in an offline phase. YPIR leverages a new lightweight technique to remove the hint from high-throughput single-server PIR schemes with small overhead. We also show how to reduce the server preprocessing time in the SimplePIR family of protocols by a factor of \( 10 \)–\( 15\times \).

By removing the need for offline communication, YPIR significantly reduces the server-side costs for private auditing of Certificate Transparency logs. Compared to the best previous PIR-based approach, YPIR reduces the server-side costs by a factor of \( 8\times \). Note that to reduce communication costs, the previous approach assumed that updates to the Certificate Transparency log servers occurred in weekly batches. Since there is no offline communication in YPIR, our approach allows clients to always audit the most recent Certificate Transparency logs (e.g., updating once a day). Supporting daily updates using the prior scheme would cost \( 48\times \) more than YPIR (based on current AWS compute costs).

BibTeX
@inproceedings{MW24,
  author    = {Samir Jordan Menon and David J. Wu},
  title     = {{YPIR}: High-Throughput Single-Server {PIR} with Silent Preprocessing},
  booktitle = {{USENIX} Security Symposium},
  year      = {2024}
}
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
PDF Video
Brent Waters and David J. Wu
STOC 2024
Resources
Abstract

A succinct non-interactive argument (SNARG) for \( \mathsf{NP} \) allows a prover to convince a verifier that an \( \mathsf{NP} \) statement \( x \) is true with a proof of size \( o(|x| + |w|) \), where \( w \) is the associated \( \mathsf{NP} \) witness. A SNARG satisfies adaptive soundness if the malicious prover can choose the statement to prove after seeing the scheme parameters. In this work, we provide the first adaptively-sound SNARG for \( \mathsf{NP} \) in the plain model assuming sub-exponentially-hard indistinguishability obfuscation, sub-exponentially-hard one-way functions, and either the (polynomial) hardness of the discrete log assumption or the (polynomial) hardness of factoring. This gives the first adaptively-sound SNARG for \( \mathsf{NP} \) from falsifiable assumptions. All previous SNARGs for \( \mathsf{NP} \) in the plain model either relied on non-falsifiable cryptographic assumptions or satisfied a weak notion of non-adaptive soundness (where the adversary has to choose the statement it proves before seeing the scheme parameters).

BibTeX
@inproceedings{WW24,
  author    = {Brent Waters and David J. Wu},
  title     = {Adaptively-Sound Succinct Arguments for {NP} from Indistinguishability Obfuscation},
  booktitle = {{STOC}},
  year      = {2024}
}
Succinct Functional Commitments for Circuits from k-Lin
PDF Video
Hoeteck Wee and David J. Wu
Eurocrypt 2024
Resources
Abstract

A functional commitment allows a user to commit to an input \( \mathbf{x} \) and later, open the commitment to an arbitrary function \( \mathbf{y} = f(\mathbf{x}) \). The size of the commitment and the opening should be sublinear in \( |\mathbf{x}| \) and \( |f| \).

In this work, we give the first pairing-based functional commitment for arbitrary circuits where the size of the commitment and the size of the opening consist of a constant number of group elements. Security relies on the standard bilateral \( k \)-\( \mathsf{Lin} \) assumption. This is the first scheme with this level of succinctness from falsifiable bilinear map assumptions (previous approaches required SNARKs for \( \mathsf{NP} \)). This is also the first functional commitment scheme for general circuits with \( \mathsf{poly}(\lambda) \)-size commitments and openings from any assumption that makes fully black-box use of cryptographic primitives and algorithms. As an immediate consequence, we also obtain a succinct non-interactive argument for arithmetic circuits (i.e., a SNARG for \( \mathsf{P}/\mathsf{poly} \)) with a universal setup and where the proofs consist of a constant number of group elements. In particular, the CRS in our SNARG only depends on the size of the arithmetic circuit \( |C| \) rather than the circuit \( C \) itself; the same CRS can be used to verify computations with respect to different circuits. Our construction relies on a new notion of projective chainable commitments which may be of independent interest.

BibTeX
@inproceedings{WW24,
  author    = {Hoeteck Wee and David J. Wu},
  title     = {Succinct Functional Commitments for Circuits from k-Lin},
  booktitle = {{EUROCRYPT}},
  year      = {2024}
}
2023
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
PDF Video
Hoeteck Wee and David J. Wu
Asiacrypt 2023
Resources
Abstract

A functional commitment allows a user to commit to an input \( \mathbf{x} \in \{0,1\}^\ell \) and later open up the commitment to a value \( y = f(\mathbf{x}) \) with respect to some function \( f \). In this work, we focus on schemes that support fast verification. Specifically, after a preprocessing step that depends only on \( f \), the verification time as well as the size of the commitment and opening should be sublinear in the input length \( \ell \), We also consider the dual setting where the user commits to the function \( f \) and later, opens up the commitment at an input \( \mathbf{x} \).

In this work, we develop two (non-interactive) functional commitments that support fast verification. The first construction supports openings to constant-degree polynomials and has a shorter CRS for a broad range of settings compared to previous constructions. Our second construction is a dual functional commitment for arbitrary bounded-depth Boolean circuits. Both schemes are lattice-based and avoid non-black-box use of cryptographic primitives or lattice sampling algorithms. Security of both constructions rely on the \( \ell \)-succinct short integer solutions (SIS) assumption, a falsifiable \( q \)-type generalization of the SIS assumption (Preprint 2023).

In addition, we study the challenges of extending lattice-based functional commitments to extractable functional commitments, a notion that is equivalent to succinct non-interactive arguments (when considering openings to quadratic relations). We describe a general methodology that heuristically breaks the extractability of our construction and provides evidence for the implausibility of the knowledge \( k \)-\( R \)-\( \mathsf{ISIS} \) assumption of Albrecht et al. (CRYPTO 2022) that was used in several constructions of lattice-based succinct arguments. If we additionally assume hardness of the standard inhomogeneous SIS assumption, we obtain a direct attack on a variant of the extractable linear functional commitment of Albrecht et al.

BibTeX
@inproceedings{WW23,
  author    = {Hoeteck Wee and David J. Wu},
  title     = {Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis},
  booktitle = {{ASIACRYPT}},
  year      = {2023}
}
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
PDF GitHub
Rachit Garg, George Lu, Brent Waters, and David J. Wu
CCS 2023
Resources
Abstract

Suppose a user wants to broadcast an encrypted message to \( K \) recipients. With public-key encryption, the sender would construct \( K \) different ciphertexts, one for each recipient. The size of the broadcasted message then scales linearly with \( K \). A natural question is whether the sender can encrypt the message with a ciphertext whose size scales sublinearly with the number of recipients.

Broadcast encryption offers one solution to this problem, but at the cost of introducing a central trusted party who issues keys to different users (and correspondingly, has the ability to decrypt all ciphertexts). Recently, several works have introduced notions like distributed broadcast encryption and flexible broadcast encryption, which combine the decentralized, trustless model of traditional public-key encryption with the efficiency guarantees of broadcast encryption. In the specific case of a flexible broadcast encryption scheme, users generate their own public/private keys and can then post their public key in any public-key directory. Subsequently, a user can encrypt to an arbitrary set of user public keys with a ciphertext whose size scales polylogarithmically with the number of public keys in the broadcast set. A distributed broadcast encryption scheme is a more restrictive primitive where each public key is also associated with an index, and one can only encrypt to a set of public keys corresponding to different indices.

In this work, we introduce a generic compiler that takes any distributed broadcast encryption scheme and produces a flexible broadcast encryption scheme. Moreover, whereas existing concretely-efficient constructions of distributed broadcast encryption have public keys whose size scales with the maximum number of users in the system, our resulting flexible broadcast encryption scheme has the appealing property that the size of each public key scales with the size of the maximum broadcast set.

We provide an implementation of the flexible broadcast encryption scheme obtained by applying our compiler to the distributed broadcast encryption scheme of Kolonelos, Malavolta, and Wee (ASIACRYPT 2023). With our scheme, a sender can encrypt a 128-bit symmetric key to a set of over 1000 recipients (from a directory with a million users) with a 2 KB ciphertext. This is 16\( \times \) smaller than separately encrypting to each user using standard ElGamal encryption. The cost is that the user public keys in flexible broadcast encryption are much larger (50 KB) compared to standard ElGamal public keys (32 bytes). Compared to the similarly-instantiated distributed broadcast encryption scheme, we achieve a 32\( \times \) reduction in the user's public key size (50 KB vs. 1.6 MB) without changing the ciphertext size. Thus, flexible broadcast encryption provides an efficient way to encrypt messages to large groups of users at the cost of larger individual public keys (relative to vanilla public-key encryption).

BibTeX
@inproceedings{GLWW23,
  author    = {Rachit Garg and George Lu and Brent Waters and David J. Wu},
  title     = {Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory},
  booktitle = {ACM Conference on Computer and Communications Security ({ACM} {CCS})},
  year      = {2023}
}
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
PDF Video
Cody Freitag, Brent Waters, and David J. Wu
Crypto 2023
Resources
Abstract

Witness encryption is a generalization of public-key encryption where the public key can be any \( \mathsf{NP} \) statement \( x \) and the associated decryption key is any witness \( w \) for \( x \). While early constructions of witness encryption relied on multilinear maps and indistinguishability obfuscation (\( i\mathcal{O} \)), recent works have provided direct constructions of witness encryption that are more efficient than \( i\mathcal{O} \) (and also seem unlikely to yield \( i\mathcal{O} \)). Motivated by this progress, we revisit the possibility of using witness encryption to realize advanced cryptographic primitives previously known only in “obfustopia.”

In this work, we give new constructions of trustless encryption systems from plain witness encryption (in conjunction with the learning-with-errors assumption): (1) flexible broadcast encryption (a broadcast encryption scheme where users choose their own secret keys and users can encrypt to an arbitrary set of public keys); and (2) registered attribute-based encryption (a system where users choose their own keys and then register their public key together with a set of attributes with a deterministic and transparent key curator). Both primitives were previously only known from \( i\mathcal{O} \). We also show how to use our techniques to obtain an optimal broadcast encryption scheme in the random oracle model.

Underlying our constructions is a novel technique for using witness encryption based on a new primitive which we call function-binding hash functions. Whereas a somewhere statistically binding hash function statistically binds a digest to a few bits of the input, a function-binding hash function statistically binds a digest to the output of a function of the inputs. As we demonstrate in this work, function-binding hash functions provide us new ways to leverage the power of plain witness encryption and use it as the foundation of advanced cryptographic primitives. Finally, we show how to build function-binding hash functions for the class of disjunctions of block functions from leveled homomorphic encryption; this in combination with witness encryption yields our main results.

BibTeX
@inproceedings{FWW23,
  author     = {Cody Freitag and Brent Waters and David J. Wu},
  title      = {How to Use (Plain) Witness Encryption: Registered {ABE}, Flexible Broadcast, and More},
  booktitle  = {{CRYPTO}},
  year       = {2023}
}
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments
PDF Video
Jeffrey Champion and David J. Wu
Crypto 2023
Resources
Abstract

Zero-knowledge and succinctness are two important properties that arise in the study of non-interactive arguments. Previously, Kitagawa et al. (TCC 2020) showed how to obtain a non-interactive zero-knowledge (NIZK) argument for NP from a succinct non-interactive argument (SNARG) for NP. In particular, their work demonstrates how to leverage the succinctness property from an argument system and transform it into a zero-knowledge property.

In this work, we study a similar question of leveraging succinctness for zero-knowledge. Our starting point is a batch argument for NP, a primitive that allows a prover to convince a verifier of \( T \) NP statements \( x_1, \ldots, x_T \) with a proof whose size scales sublinearly with \( T \). Unlike SNARGs for NP, batch arguments for NP can be built from group-based assumptions in both pairing and pairing-free groups and from lattice-based assumptions. The challenge with batch arguments is that the proof size is only amortized over the number of instances, but can still encode full information about the witness to a small number of instances.

We show how to combine a batch argument for NP with a local pseudorandom generator (i.e., a pseudorandom generator where each output bit only depends on a small number of input bits) and a dual-mode commitment scheme to obtain a NIZK for NP. Our work provides a new generic approach of realizing zero-knowledge from succinctness and highlights a new connection between succinctness and zero-knowledge.

BibTeX
@inproceedings{CW23,
  author     = {Jeffrey Champion and David J. Wu},
  title      = {Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments},
  booktitle  = {{CRYPTO}},
  year       = {2023}
}
Authenticated Private Information Retrieval
PDF Video GitHub
USENIX Security 2023
Resources
Abstract

This paper introduces protocols for authenticated private information retrieval. These schemes enable a client to fetch a record from a remote database server such that (a) the server does not learn which record the client reads, and (b) the client either obtains the “authentic” record or detects server misbehavior and safely aborts. Both properties are crucial for many applications. Standard private-information-retrieval schemes either do not ensure this form of output authenticity, or they require multiple database replicas with an honest majority. In contrast, we offer multi-server schemes that protect security as long as at least one server is honest. Moreover, if the client can obtain a short digest of the database out of band, then our schemes require only a single server. Performing an authenticated private PGP-public-key lookup on an OpenPGP key server's database of 3.5 million keys (3 GiB), using two non-colluding servers, takes under 1.2 core-seconds of computation, essentially matching the time taken by unauthenticated private information retrieval. Our authenticated single-server schemes are 30-100\( \times \) more costly than state-of-the-art unauthenticated single-server schemes, though they achieve incomparably stronger integrity properties.

BibTeX
@inproceedings{CNCWF23,
  author    = {Simone Colombo and Kirill Nikitin and Henry Corrigan-Gibbs and David J. Wu and Bryan Ford},
  title     = {Authenticated Private Information Retrieval},
  booktitle = {{USENIX} Security Symposium},
  year      = {2023}
}
Succinct Vector, Polynomial, and Functional Commitments from Lattices
PDF Video
Hoeteck Wee and David J. Wu
Eurocrypt 2023
Resources
Abstract

Vector commitment schemes allow a user to commit to a vector of values \( \mathbf{x} \in \{0, 1\}^\ell \) and later, open up the commitment to a specific set of positions. Both the size of the commitment and the size of the opening should be succinct (i.e., polylogarithmic in the length \( \ell \) of the vector). Vector commitments and their generalizations to polynomial commitments and functional commitments are key building blocks for many cryptographic protocols.

We introduce a new framework for constructing non-interactive lattice-based vector commitments and their generalizations. A simple instantiation of our framework yields a new vector commitment scheme from the standard short integer solution (SIS) assumption that supports private openings and large messages. We then show how to use our framework to obtain the first succinct functional commitment scheme that supports openings with respect to arbitrary bounded-depth Boolean circuits. In this scheme, a user commits to a vector \( \mathbf{x} \in \{0, 1\}^\ell \), and later on, open the commitment to any function \( f(\mathbf{x}) \). Both the commitment and the opening are non-interactive and succinct: namely, they have size \( \mathsf{poly}(\lambda, d, \log \ell) \), where \( \lambda \) is the security parameter and \( d \) is the depth of the Boolean circuit computing \( f \). Previous constructions of functional commitments could only support constant-degree polynomials, or require a trusted online authority, or rely on non-falsifiable assumptions. The security of our functional commitment scheme is based on a new falsifiable family of “basis-augmented” SIS assumptions (\( \textsf{BASIS} \)) we introduce in this work.

We also show how to use our vector commitment framework to obtain (1) a polynomial commitment scheme where the user can commit to a polynomial \( f \in \mathbb{Z}_q[x] \) and subsequently open the commitment to an evaluation \( f(x) \in \mathbb{Z}_q \); and (2) an aggregatable vector (resp., functional) commitment where a user can take a set of openings to multiple indices (resp., function evaluations) and aggregate them into a single short opening. Both of these extensions rely on the same \( \textsf{BASIS} \) assumption we use to obtain our succinct functional commitment scheme.

BibTeX
@inproceedings{WW23,
  author    = {Hoeteck Wee and David J. Wu},
  title     = {Succinct Vector, Polynomial, and Functional Commitments from Lattices},
  booktitle = {{EUROCRYPT}},
  year      = {2023}
}
Registered Attribute-Based Encryption
PDF Video
Eurocrypt 2023
Resources
Abstract

Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-grained control to encrypted data. However, ABE upends the traditional trust model of public-key encryption by requiring a single trusted authority to issue decryption keys. If an adversary compromises the central authority and exfiltrates its secret key, then the adversary can decrypt every ciphertext in the system.

This work introduces registered ABE, a primitive that allows users to generate secret keys on their own and then register the associated public key with a “key curator” along with their attributes. The key curator aggregates the public keys from the different users into a single compact master public key. To decrypt, users occasionally need to obtain helper decryption keys from the key curator which they combine with their own secret keys. We require that the size of the aggregated public key, the helper decryption keys, the ciphertexts, as well as the encryption/decryption times to be polylogarithmic in the number of registered users. Moreover, the key curator is entirely transparent and maintains no secrets. Registered ABE generalizes the notion of registration-based encryption (RBE) introduced by Garg et al. (TCC 2018), who focused on the simpler setting of identity-based encryption.

We construct a registered ABE scheme that supports an a priori bounded number of users and policies that can be described by a linear secret sharing scheme (e.g., monotone Boolean formulas) from assumptions on composite-order pairing groups. Our approach deviates sharply from previous techniques for constructing RBE and only makes black-box use of cryptography. All existing RBE constructions (a weaker notion than registered ABE) rely on heavy non-black-box techniques. The encryption and decryption costs of our construction are comparable to those of vanilla pairing-based ABE. Two limitations of our scheme are that it requires a structured reference string whose size scales quadratically with the number of users (and linearly with the size of the attribute universe) and the running time of registration scales linearly with the number of users.

Finally, as a feasibility result, we construct a registered ABE scheme that supports general policies and an arbitrary number of users from indistinguishability obfuscation and somewhere statistically binding hash functions.

BibTeX
@inproceedings{HLWW23,
  author    = {Susan Hohenberger and George Lu and Brent Waters and David J. Wu},
  title     = {Registered Attribute-Based Encryption},
  booktitle = {{EUROCRYPT}},
  year      = {2023}
}
2022
Multi-Authority ABE from Lattices without Random Oracles
PDF Video
Brent Waters, Hoeteck Wee, and David J. Wu
TCC 2022
Resources
Abstract

Attribute-based encryption (ABE) extends public-key encryption to enable fine-grained control to encrypted data. However, this comes at the cost of needing a central trusted authority to issue decryption keys. A multi-authority ABE (MA-ABE) scheme decentralizes ABE and allows anyone to serve as an authority. Existing constructions of MA-ABE only achieve security in the random oracle model.

In this work, we develop new techniques for constructing MA-ABE for the class of subset policies (which captures policies such as conjunctions and DNF formulas) whose security can be based in the plain model without random oracles. We achieve this by relying on the recently-proposed “evasive” learning with errors (LWE) assumption by Wee (EUROCRYPT 2022) and Tsabury (CRYPTO 2022).

Along the way, we also provide a modular view of the MA-ABE scheme for DNF formulas by Datta et al. (EUROCRYPT 2021) in the random oracle model. We formalize this via a general version of a related-trapdoor LWE assumption by Brakerski and Vaikuntanathan (ITCS 2022), which can in turn be reduced to the plain LWE assumption. As a corollary, we also obtain an MA-ABE scheme for subset policies from plain LWE with a polynomial modulus-to-noise ratio in the random oracle model. This improves upon the Datta et al. construction which relied on LWE with a sub-exponential modulus-to-noise ratio. Moreover, we are optimistic that the generalized related-trapdoor LWE assumption will also be useful for analyzing the security of other lattice-based constructions.

BibTeX
@inproceedings{WWW22,
  author    = {Brent Waters and Hoeteck Wee and David J. Wu},
  title     = {Multi-Authority {ABE} from Lattices without Random Oracles},
  booktitle = {{TCC}},
  year      = {2022}
}
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
PDF Video
TCC 2022
Resources
Abstract

Non-interactive batch arguments for \( \mathsf{NP} \) provide a way to amortize the cost of \( \mathsf{NP} \) verification across multiple instances. In particular, they allow a prover to convince a verifier of multiple \( \mathsf{NP} \) statements with communication that scales sublinearly in the number of instances.

In this work, we study fully succinct batch arguments for \( \mathsf{NP} \) in the common reference string (CRS) model where the length of the proof scales not only sublinearly in the number of instances \( T \), but also sublinearly with the size of the \( \mathsf{NP} \) relation. Batch arguments with these properties are special cases of succinct non-interactive arguments (SNARGs); however, existing constructions of SNARGs either rely on idealized models or strong non-falsifiable assumptions. The one exception is the Sahai-Waters SNARG based on indistinguishability obfuscation. However, when applied to the setting of batch arguments, we must impose an a priori bound on the number of instances. Moreover, the size of the common reference string scales linearly with the number of instances.

In this work, we give a direct construction of a fully succinct batch argument for \( \mathsf{NP} \) that supports an unbounded number of statements from indistinguishability obfuscation and one-way functions. Then, by additionally relying on a somewhere statistically binding (SSB) hash function, we show how to extend our construction to obtain a fully succinct and updatable batch argument. In the updatable setting, a prover can take a proof \( \pi \) on \( T \) statements \( (x_1, \ldots, x_T) \) and “update” it to obtain a proof \( \pi' \) on \( (x_1, \ldots, x_T, x_{T + 1}) \). Notably, the update procedure only requires knowledge of a (short) proof for \( (x_1, \ldots, x_T) \) along with a single witness \( w_{T + 1} \) for the new instance \( x_{T + 1} \). Importantly, the update does not require knowledge of witnesses for \( x_1, \ldots, x_T \).

BibTeX
@inproceedings{GSWW22,
  author    = {Rachit Garg and Kristin Sheridan and Brent Waters and David J. Wu},
  title     = {Fully Succinct Batch Arguments for {NP} from Indistinguishability Obfuscation},
  booktitle = {{TCC}},
  year      = {2022}
}
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
PDF Video
Brent Waters and David J. Wu
Crypto 2022
Best Paper AwardInvited to Journal of Cryptology
Resources
Abstract

Non-interactive batch arguments for NP provide a way to amortize the cost of NP verification across multiple instances. They enable a prover to convince a verifier of multiple NP statements with communication much smaller than the total witness length and verification time much smaller than individually checking each instance.

In this work, we give the first construction of a non-interactive batch argument for NP from standard assumptions on groups with bilinear maps (specifically, from either the subgroup decision assumption in composite-order groups or from the \( k \)-Lin assumption in prime-order groups for any \( k \ge 1 \)). Previously, batch arguments for NP were only known from LWE, or a combination of multiple assumptions, or from non-standard/non-falsifiable assumptions. Moreover, our work introduces a new direct approach for batch verification and avoids heavy tools like correlation-intractable hash functions or probabilistically-checkable proofs common to previous approaches.

As corollaries to our main construction, we obtain the first publicly-verifiable non-interactive delegation scheme for RAM programs (i.e., a succinct non-interactive argument (SNARG) for P) with a CRS of sublinear size (in the running time of the RAM program), as well as the first aggregate signature scheme (supporting bounded aggregation) from standard assumptions on bilinear maps.

BibTeX
@inproceedings{WW22,
  author     = {Brent Waters and David J. Wu},
  title      = {Batch Arguments for {NP} and More from Standard Bilinear Group Assumptions},
  booktitle  = {{CRYPTO}},
  year       = {2022}
}
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
PDF Video GitHub
Samir Jordan Menon and David J. Wu
IEEE S&P (Oakland) 2022
Resources
Abstract

We introduce the Spiral family of single-server private information retrieval (PIR) protocols. Spiral relies on a composition of two lattice-based homomorphic encryption schemes: the Regev encryption scheme and the Gentry-Sahai-Waters encryption scheme. We introduce new ciphertext translation techniques to convert between these two schemes and in doing so, enable new trade-offs in communication and computation. Across a broad range of database configurations, the basic version of Spiral simultaneously achieves at least a 4.5x reduction in query size, 1.5x reduction in response size, and 2x increase in server throughput compared to previous systems. A variant of our scheme, SpiralStreamPack, is optimized for the streaming setting and achieves a server throughput of 1.9 GB/s for databases with over a million records (compared to 200 MB/s for previous protocols) and a rate of 0.81 (compared to 0.24 for previous protocols). For streaming large records (e.g., a private video stream), we estimate the monetary cost of SpiralStreamPack to be only 1.9x greater than that of the no-privacy baseline where the client directly downloads the desired record.

BibTeX
@inproceedings{MW22,
  author     = {Samir Jordan Menon and David J. Wu},
  title      = {\textsc{Spiral}: Fast, High-Rate Single-Server {PIR} via {FHE} Composition},
  booktitle  = {{IEEE} {S\&P}},
  year       = {2022}
}
Traceable PRFs: Full Collusion Resistance and Active Security
PDF Video
Sarasij Maitra and David J. Wu
PKC 2022
Invited to Journal of Cryptology
Resources
Abstract

The main goal of traceable cryptography is to protect against unauthorized redistribution of cryptographic functionalities. Such schemes provide a way to embed identities (i.e., a “mark”) within cryptographic objects (e.g., decryption keys in an encryption scheme, signing keys in a signature scheme). In turn, the tracing guarantee ensures that any “pirate device” that successfully replicates the underlying functionality can be successfully traced to the set of identities used to build the device.

In this work, we study traceable pseudorandom functions (PRFs). As PRFs are the workhorses of symmetric cryptography, traceable PRFs are useful for augmenting symmetric cryptographic primitives with strong traceable security guarantees. However, existing constructions of traceable PRFs either rely on strong notions like indistinguishability obfuscation or satisfy weak security guarantees like single-key security (i.e., tracing only works against adversaries that possess a single marked key).

In this work, we show how to use fingerprinting codes to upgrade a single-key traceable PRF into a fully collusion resistant traceable PRF, where security holds regardless of how many keys the adversary possesses. We additionally introduce a stronger notion of security where tracing security holds even against active adversaries that have oracle access to the tracing algorithm. In conjunction with known constructions of single-key traceable PRFs, we obtain the first fully collusion resistant traceable PRF from standard lattice assumptions. Our traceable PRFs directly imply new lattice-based secret-key traitor tracing schemes that are CCA-secure and where tracing security holds against active adversaries that have access to the tracing oracle.

BibTeX
@inproceedings{MW22,
  author    = {Sarasij Maitra and David J. Wu},
  title     = {Traceable {PRFs}: Full Collusion Resistance and Active Security},
  booktitle = {International Conference on Practice and Theory in Public-Key Cryptography ({PKC})},
  year      = {2022}
}
2021
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
PDF Video
Rishab Goyal, Sam Kim, Brent Waters, and David J. Wu
Asiacrypt 2021
Resources
Abstract

Software watermarking schemes allow a user to embed an identifier into a piece of code such that the resulting program is nearly functionally-equivalent to the original program, and yet, it is difficult to remove the identifier without destroying the functionality of the program. Such schemes are often considered for proving software ownership or for digital rights management. Existing constructions of watermarking have focused primarily on watermarking pseudorandom functions (PRFs).

In this work, we revisit the definitional foundations of watermarking, and begin by highlighting a major flaw in existing security notions. Existing security notions for watermarking only require that the identifier be successfully extracted from programs that preserve the exact input/output behavior of the original program. In the context of PRFs, this means that an adversary that constructs a program which computes a quarter of the output bits of the PRF or that is able to distinguish the outputs of the PRF from random are considered to be outside the threat model. However, in any application (e.g., watermarking a decryption device or an authentication token) that relies on PRF security, an adversary that manages to predict a quarter of the bits or distinguishes the PRF outputs from random would be considered to have defeated the scheme. Thus, existing watermarking schemes provide very little security guarantee against realistic adversaries. None of the existing constructions of watermarkable PRFs would be able to extract the identifier from a program that only outputs a quarter of the bits of the PRF or one that perfectly distinguishes.

To address the shortcomings in existing watermarkable PRF definitions, we introduce a new primitive called a traceable PRF. Our definitions are inspired by similar definitions from public-key traitor tracing, and aim to capture a very robust set of adversaries: namely, any adversary that produces a useful distinguisher (i.e., a program that can break PRF security), can be traced to a specific identifier. We provide a general framework for constructing traceable PRFs via an intermediate primitive called private linear constrained PRFs. Finally, we show how to construct traceable PRFs from a similar set of assumptions previously used to realize software watermarking. Namely, we obtain a single-key traceable PRF from standard lattice assumptions and a fully collusion-resistant traceable PRF from indistinguishability obfuscation (together with injective one-way functions).

BibTeX
@inproceedings{GKWW21,
  author    = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu},
  title     = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions},
  booktitle = {{ASIACRYPT}},
  year      = {2021}
}
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
PDF Video GitHub
Yuval Ishai, Hang Su, and David J. Wu
CCS 2021
Resources
Abstract

Zero-knowledge succinct arguments of knowledge (zkSNARKs) enable efficient privacy-preserving proofs of membership for general \( \mathsf{NP} \) languages. Our focus in this work is on post-quantum zkSNARKs, with a focus on minimizing proof size. Currently, there is a \( 1000\times \) gap in the proof size between the best pre-quantum constructions and the best post-quantum ones. Here, we develop and implement new lattice-based zkSNARKs in the designated-verifier preprocessing model. With our construction, after an initial preprocessing step, a proof for an \( \mathsf{NP} \) relation of size \( 2^{20} \) is just over 16 KB. Our proofs are \( 10.3\times \) shorter than previous post-quantum zkSNARKs for general \( \mathsf{NP} \) languages. Compared to previous lattice-based zkSNARKs (also in the designated-verifier preprocessing model), we obtain a \( 42\times \) reduction in proof size and a \( 60\times \) reduction in the prover's running time, all while achieving a much higher level of soundness. Compared to the shortest pre-quantum zkSNARKs by Groth (Eurocrypt 2016), the proof size in our lattice-based construction is \( 131\times \) longer, but both the prover and the verifier are faster (by \( 1.2\times \) and \( 2.8\times \), respectively).

Our construction follows the general blueprint of Bitansky et al. (TCC 2013) and Boneh et al. (Eurocrypt 2017) of combining a linear probabilistically checkable proof (linear PCP) together with a linear-only vector encryption scheme. We develop a concretely-efficient lattice-based instantiation of this compiler by considering quadratic extension fields of moderate characteristic and using linear-only vector encryption over rank-2 module lattices.

BibTeX
@inproceedings{ISW21,
  author    = {Yuval Ishai and Hang Su and David J. Wu},
  title     = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices},
  booktitle = {ACM Conference on Computer and Communications Security ({ACM} {CCS})},
  year      = {2021}
}
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
PDF Video GitHub
Sijun Tan, Brian Knott, Yuan Tian, and David J. Wu
IEEE S&P (Oakland) 2021
Resources
Abstract

We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing scalable privacy-preserving deep learning. In this work, we start by introducing a new interface to losslessly embed cryptographic operations over secret-shared values (in a discrete domain) into floating-point operations that can be processed by highly-optimized CUDA kernels for linear algebra. We then identify a sequence of “GPU-friendly” cryptographic protocols to enable privacy-preserving evaluation of both linear and non-linear operations on the GPU. Our microbenchmarks indicate that our private GPU-based convolution protocol is over 150x faster than the analogous CPU-based protocol; for non-linear operations like the ReLU activation function, our GPU-based protocol is around 10x faster than its CPU analog.

With CryptGPU, we support private inference and private training on convolutional neural networks with over 60 million parameters as well as handle large datasets like ImageNet. Compared to the previous state-of-the-art, when considering large models and datasets, our protocols achieve a 2x to 8x improvement in private inference and a 6x to 36x improvement for private training. Our work not only showcases the viability of performing secure multiparty computation (MPC) entirely on the GPU to enable fast privacy-preserving machine learning, but also highlights the importance of designing new MPC primitives that can take full advantage of the GPU's computing capabilities.

BibTeX
@inproceedings{TKTW21,
  author     = {Sijun Tan and Brian Knott and Yuan Tian and David J. Wu},
  title      = {\textsc{CryptGPU}: Fast Privacy-Preserving Machine Learning on the {GPU}},
  booktitle  = {{IEEE} {S\&P}},
  year       = {2021}
}
Avoiding Genetic Racial Profiling in Criminal DNA Profile Databases
PDF GitHub
Nature Computational Science 2021
Resources
Media Coverage
Abstract

DNA profiling has become an essential tool for crime solving and prevention, and CODIS (Combined DNA Index System) criminal investigation databases have flourished at the national, state and even local level. However, reports suggest that the DNA profiles of all suspects searched in these databases are often retained, which could result in racial profiling. Here, we devise an approach to both enable broad DNA profile searches and preserve exonerated citizens’ privacy through a real-time privacy-preserving procedure to query CODIS databases. Using our approach, an agent can privately and efficiently query a suspect’s DNA profile device in the field, learning only whether the profile matches against any database profile. More importantly, the central database learns nothing about the queried profile, and thus cannot retain it. Our approach paves the way to implement privacy-preserving DNA profile searching in CODIS databases and any CODIS-like system.

BibTeX
@article{BJBW21,
  author  = {Jacob A. Blindenbach and Karthik A. Jagadeesh and Gill Bejerano and David J. Wu},
  title   = {Avoiding Genetic Racial Profiling in Criminal {DNA} Profile Databases},
  journal = {Nature Computational Science},
  volume  = {1},
  number  = {4},
  pages   = {272--279},
  year    = {2021}
}
2020
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
PDF Video
Sam Kim and David J. Wu
Asiacrypt 2020
Resources
Abstract

A traitor tracing scheme is a multi-user public-key encryption scheme where each user in the system holds a decryption key that is associated with the user's identity. Using the public key, a content distributor can encrypt a message to all of the users in the system. At the same time, if a malicious group of users combine their respective decryption keys to build a “pirate decoder,” there is an efficient tracing algorithm that the content distributor can use to identify at least one of the keys used to construct the decoder. A trace-and-revoke scheme is an extension of a standard traitor tracing scheme where there is an additional key-revocation mechanism that the content distributor can use to disable the decryption capabilities of compromised keys. Namely, during encryption, the content distributor can encrypt a message with respect to a list of revoked users such that only non-revoked users can decrypt the resulting ciphertext.

Trace-and-revoke schemes are challenging to construct. Existing constructions from standard assumptions can only tolerate bounded collusions (i.e., there is an a priori bound on the number of keys an adversary obtains), have system parameters that scale exponentially in the bit-length of the identities, or satisfy weaker notions of traceability that are vulnerable to certain types of “pirate evolution” attacks. In this work, we provide the first construction of a trace-and-revoke scheme that is fully collusion resistant and capable of supporting arbitrary identities (i.e., the identities can be drawn from an exponential-size space). Our scheme supports public encryption and secret tracing, and can be based on the sub-exponential hardness of the LWE problem (with a super-polynomial modulus-to-noise ratio). The ciphertext size in our construction scales logarithmically in the size of the identity space and linearly in the size of the revocation list. Our scheme leverages techniques from both combinatorial and algebraic constructions for traitor tracing.

BibTeX
@inproceedings{KW20,
  author     = {Sam Kim and David J. Wu},
  title      = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions},
  booktitle  = {{ASIACRYPT}},
  year       = {2020}
}
On Succinct Arguments and Witness Encryption from Groups
PDF Video
Ohad Barta, Yuval Ishai, Rafail Ostrovsky, and David J. Wu
Crypto 2020
Resources
Abstract

Succinct non-interactive arguments (SNARGs) enable proofs of NP statements with very low communication. Recently, there has been significant work in both theory and practice on constructing SNARGs with very short proofs. Currently, the state-of-the-art in succinctness is due to Groth (Eurocrypt 2016) who constructed a SNARG from bilinear maps where the proof consists of just 3 group elements.

In this work, we first construct a concretely-efficient designated-verifier (preprocessing) SNARG with inverse polynomial soundness, where the proof consists of just 2 group elements in a standard (generic) group. This leads to a 50% reduction in concrete proof size compared to Groth's construction. We follow the approach of Bitansky et al. (TCC 2013) who describe a compiler from linear PCPs to SNARGs in the preprocessing model. Our improvement is based on a new linear PCP packing technique that allows us to construct 1-query linear PCPs which can then be compiled into a SNARG (using ElGamal encryption over a generic group). An appealing feature of our new SNARG is that the verifier can precompute a statement-independent lookup table in an offline phase; verifying proofs then only requires 2 exponentiations and a single table lookup. This makes our new designated-verifier SNARG appealing in settings that demand fast verification and minimal communication.

We then turn to the question of constructing arguments where the proof consists of a single group element. Here, we first show that any (possibly interactive) argument for a language \( \mathcal{L} \) where the verification algorithm is “generic” (i.e., only performs generic group operations) and the proof consists of a single group element, implies a witness encryption scheme for \( \mathcal{L} \). We then show that under a yet-unproven, but highly plausible, hypothesis on the hardness of approximating the minimal distance of linear codes, we can construct a 2-message laconic argument for NP where the proof consists of a single group element. Under the same hypothesis, we obtain a witness encryption scheme for NP in the generic group model. Along the way, we show that under a conceptually-similar but proven hardness of approximation result, there is a 2-message laconic argument for NP with negligible soundness error where the prover's message consists of just 2 group elements. In both settings, we obtain laconic arguments (and linear PCPs) with linear decision procedures. Our constructions circumvent a previous lower bound by Groth on such argument systems with linear decision procedures by relying on imperfect completeness. Namely, our constructions have vanishing but not negligible completeness error, while the lower bound of Groth implicitly assumes negligible completeness error of the underlying argument. Our techniques thus highlight new avenues for designing linear PCPs, succinct arguments, and witness encryption schemes.

BibTeX
@inproceedings{BIOW20,
  author     = {Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu},
  title      = {On Succinct Arguments and Witness Encryption from Groups},
  booktitle  = {{CRYPTO}},
  year       = {2020}
}
Can Verifiable Delay Functions be Based on Random Oracles?
PDF Video
Mohammad Mahmoody, Caleb Smith, and David J. Wu
ICALP 2020
Resources
Abstract

Boneh, Bonneau, Bünz, and Fisch (CRYPTO 2018) recently introduced the notion of a verifiable delay function (VDF). VDFs are functions that take a long sequential time \( T \) to compute, but whose outputs \( y := \text{Eval}(x) \) can be efficiently verified (possibly given a proof \( \pi \)) in time \( t \ll T \) (e.g., \( t=\text{poly}(\lambda, \log T) \) where \( \lambda \) is the security parameter). The first security requirement on a VDF, called uniqueness, is that no polynomial-time algorithm can find a convincing proof \( \pi' \) that verifies for an input \( x \) and a different output \( y' \neq y \). The second security requirement, called sequentiality, is that no polynomial-time algorithm running in time \( \sigma\lt T \) for some parameter \( \sigma \) (e.g., \( \sigma=T^{1/10} \)) can compute \( y \), even with \( \text{poly}(T,\lambda) \) many parallel processors. Starting from the work of Boneh et al., there are now multiple constructions of VDFs from various algebraic assumptions.

In this work, we study whether VDFs can be constructed from ideal hash functions in a black-box way, as modeled in the random oracle model (ROM). In the ROM, we measure the running time by the number of oracle queries and the sequentiality by the number of rounds of oracle queries. We rule out two classes of constructions of VDFs in the ROM:

  • We show that VDFs satisfying perfect uniqueness (i.e., no different convincing solution \( y' \neq y \) exists) cannot be constructed in the ROM. More formally, we give an attacker that finds the solution \( y \) in \( \approx t \) rounds of queries, asking only \( \text{poly}(T) \) queries in total.

  • We also rule out tight VDFs in the ROM. Tight VDFs were recently studied by Döttling, Garg, Malavolta, and Vasudevan (ePrint Report 2019) and require sequentiality \( \sigma \approx T-T^\rho \) for some constant \( 0 \lt \rho \lt 1 \). More generally, our lower bound also applies to proofs of sequential work (i.e., VDFs without the uniqueness property), even in the private verification setting, and sequentiality \( \sigma \gt T- T / (2t) \) for a concrete verification time \( t \).

BibTeX
@inproceedings{MSW20,
  author     = {Mohammad Mahmoody and Caleb Smith and David J. Wu},
  title      = {Can Verifiable Delay Functions be Based on Random Oracles?},
  booktitle  = {{ICALP}},
  year       = {2020}
}
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
PDF Video
Eurocrypt 2020
Resources
Abstract

Non-interactive zero-knowledge proofs (NIZKs) are important primitives in cryptography. A major challenge since the early works on NIZKs has been to construct NIZKs with a statistical zero-knowledge guarantee against unbounded verifiers. In the common reference string (CRS) model, such “statistical NIZK arguments” are currently known from k-Lin in a pairing-group and from LWE. In the (reusable) designated-verifier model (DV-NIZK), where a trusted setup algorithm generates a reusable verification key for checking proofs, we also have a construction from DCR. If we relax our requirements to computational zero-knowledge, we additionally have NIZKs from factoring and CDH in a pairing group in the CRS model, and from nearly all assumptions that imply public-key encryption (e.g., CDH, LPN, LWE) in the designated-verifier model. Thus, there still remains a gap in our understanding of statistical NIZKs in both the CRS and the designated-verifier models.

In this work, we develop new techniques for constructing statistical NIZK arguments. First, we construct statistical DV-NIZK arguments from the k-Lin assumption in pairing-free groups, the QR assumption, and the DCR assumption. These are the first constructions in pairing-free groups and from QR that satisfy statistical zero-knowledge. All of our constructions are secure even if the verification key is chosen maliciously (i.e., they are “malicious-designated-verifier” NIZKs), and moreover, they satisfy a “dual-mode” property where the CRS can be sampled from two computationally indistinguishable distributions: one distribution yields statistical DV-NIZK arguments while the other yields computational DV-NIZK proofs. We then show how to adapt our k-Lin construction in a pairing group to obtain new publicly-verifiable statistical NIZK arguments from pairings with a qualitatively weaker assumption than existing constructions of pairing-based statistical NIZKs.

Our constructions follow the classic paradigm of Feige, Lapidot, and Shamir (FLS). While the FLS framework has traditionally been used to construct computational (DV)-NIZK proofs, we newly show that the same framework can be leveraged to construct dual-mode (DV)-NIZKs.

BibTeX
@inproceedings{LPWW20,
  author     = {Beno{\^{i}}t Libert and Alain Passel{\`{e}}gue and Hoeteck Wee and David J. Wu},
  title      = {New Constructions of Statistical {NIZKs}: Dual-Mode {DV-NIZKs} and More},
  booktitle  = {{EUROCRYPT}},
  year       = {2020}
}
2019
New Constructions of Reusable Designated-Verifier NIZKs
PDF Video
Crypto 2019
Resources
Abstract

Non-interactive zero-knowledge arguments (NIZKs) for NP are an important cryptographic primitive, but we currently only have instantiations under a few specific assumptions. Notably, we are missing constructions from the learning with errors (LWE) assumption, the Diffie-Hellman (CDH/DDH) assumption, and the learning parity with noise (LPN) assumption.

In this paper, we study a relaxation of NIZKs to the designated-verifier setting (DV-NIZK), where a trusted setup generates a common reference string together with a secret key for the verifier. We want reusable schemes, which allow the verifier to reuse the secret key to verify many different proofs, and soundness should hold even if the malicious prover learns whether various proofs are accepted or rejected. Such reusable DV-NIZKs were recently constructed under the CDH assumption, but it was open whether they can also be constructed under LWE or LPN.

We also consider an extension of reusable DV-NIZKs to the malicious designated-verifier setting (MDV-NIZK). In this setting, the only trusted setup consists of a common random string. However, there is also an additional untrusted setup in which the verifier chooses a public/secret key needed to generate/verify proofs, respectively. We require that zero-knowledge holds even if the public key is chosen maliciously by the verifier. Such reusable MDV-NIZKs were recently constructed under the “one-more CDH” assumption, but constructions under CDH/LWE/LPN remained open.

In this work, we give new constructions of (reusable) DV-NIZKs and MDV-NIZKs using generic primitives that can be instantiated under CDH, LWE, or LPN.

BibTeX
@inproceedings{LQRWW19,
  author     = {Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu},
  title      = {New Constructions of Reusable Designated-Verifier {NIZKs}},
  booktitle  = {{CRYPTO}},
  year       = {2019}
}
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
PDF Video
Sam Kim and David J. Wu
Crypto 2019
Resources
Abstract

A software watermarking scheme enables one to embed a “mark” (i.e., a message) within a program while preserving the program's functionality. Moreover, there is an extraction algorithm that recovers an embedded message from a program. The main security goal is that it should be difficult to remove the watermark without destroying the functionality of the program. Existing constructions of watermarking focus on watermarking cryptographic functions like pseudorandom functions (PRFs); even in this setting, realizing watermarking from standard assumptions remains difficult. The first lattice-based construction of secret-key watermarking due to Kim and Wu (CRYPTO 2017) only ensures mark-unremovability against an adversary who does not have access to the mark-extraction oracle. The construction of Quach et al. (TCC 2018) achieves the stronger notion of mark-unremovability even if the adversary can make extraction queries, but has the drawback that the watermarking authority (who holds the watermarking secret key) can break pseudorandomness of all PRF keys in the family (including unmarked keys).

In this work, we construct new lattice-based secret-key watermarking schemes for PRFs that both provide unremovability against adversaries that have access to the mark-extraction oracle and offer a strong and meaningful notion of pseudorandomness even against the watermarking authority (i.e., the outputs of unmarked keys are pseudorandom almost everywhere). Moreover, security of several of our schemes can be based on the hardness of computing nearly polynomial approximations to worst-case lattice problems. This is a qualitatively weaker assumption than that needed for existing lattice-based constructions of watermarking (that support message-embedding), all of which require quasi-polynomial approximation factors. Our constructions rely on a new cryptographic primitive called an extractable PRF, which may be of independent interest.

BibTeX
@inproceedings{KW19,
  author     = {Sam Kim and David J. Wu},
  title      = {Watermarking {PRFs} from Lattices: Stronger Security via Extractable {PRFs}},
  booktitle  = {{CRYPTO}},
  year       = {2019}
}
Watermarking Public-Key Cryptographic Primitives
PDF Video
Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, and David J. Wu
Crypto 2019
Resources
Abstract

A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a marked program without corrupting its behavior. Existing constructions of software watermarking from standard assumptions have focused exclusively on watermarking pseudorandom functions (PRFs).

In this work, we study watermarking public-key primitives such as the signing key of a digital signature scheme or the decryption key of a public-key (predicate) encryption scheme. While watermarking public-key primitives might seem more challenging than watermarking PRFs, we show how to construct watermarkable variants of these notions while only relying on standard, and oftentimes, minimal, assumptions. Our watermarkable signature scheme relies only on the minimal assumption that one-way functions exist and satisfies ideal properties such as public marking, public mark-extraction, and full collusion resistance. Our watermarkable public-key encryption schemes are built using techniques developed for the closely-related problem of traitor tracing. Notably, we obtain fully collusion resistant watermarkable attribute-based encryption in the private-key setting from the standard learning with errors assumption and a bounded collusion resistant watermarkable predicate encryption scheme with public mark-extraction and public marking from the minimal assumption that public-key encryption exists.

BibTeX
@inproceedings{GKMWW19,
  author     = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu},
  title      = {Watermarking Public-Key Cryptographic Primitives},
  booktitle  = {{CRYPTO}},
  year       = {2019}
}
2018
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications
PDF Video
TCC 2018
Resources
Abstract

Pseudorandom functions (PRFs) are one of the fundamental building blocks in cryptography. We explore a new space of plausible PRF candidates that are obtained by mixing linear functions over different small moduli. Our candidates are motivated by the goals of maximizing simplicity and minimizing complexity measures that are relevant to cryptographic applications such as secure multiparty computation.

We present several concrete new PRF candidates that follow the above approach. Our main candidate is a weak PRF candidate (whose conjectured pseudorandomness only holds for uniformly random inputs) that first applies a secret mod-2 linear mapping to the input, and then a public mod-3 linear mapping to the result. This candidate can be implemented by depth-2 ACC0 circuits. We also put forward a similar depth-3 strong PRF candidate. Finally, we present a different weak PRF candidate that can be viewed as a deterministic variant of “Learning Parity with Noise” (LPN) where the noise is obtained via a mod-3 inner product of the input and the key.

The advantage of our approach is twofold. On the theoretical side, the simplicity of our candidates enables us to draw natural connections between their hardness and questions in complexity theory or learning theory (e.g., learnability of depth-2 ACC0 circuits and width-3 branching programs, interpolation and property testing for sparse polynomials, and natural proof barriers for showing super-linear circuit lower bounds). On the applied side, the “piecewise-linear” structure of our candidates lends itself nicely to applications in secure multiparty computation (MPC). Using our PRF candidates, we construct protocols for distributed PRF evaluation that achieve better round complexity and/or communication complexity (often both) compared to protocols obtained by combining standard MPC protocols with PRFs like AES, LowMC, or Rasta (the latter two are specialized MPC-friendly PRFs). Our advantage over competing approaches is maximized in the setting of MPC with an honest majority, or alternatively, MPC with preprocessing.

Finally, we introduce a new primitive we call an encoded-input PRF, which can be viewed as an interpolation between weak PRFs and standard (strong) PRFs. As we demonstrate, an encoded-input PRF can often be used as a drop-in replacement for a strong PRF, combining the efficiency benefits of weak PRFs and the security benefits of strong PRFs. We conclude by showing that our main weak PRF candidate can plausibly be boosted to an encoded-input PRF by leveraging error-correcting codes.

BibTeX
@inproceedings{BIPSW18,
  author     = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu},
  title      = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their Applications},
  booktitle  = {{TCC}},
  year       = {2018}
}
Function-Hiding Inner Product Encryption is Practical
PDF GitHub
Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, and David J. Wu
SCN 2018
Resources
Abstract

In a functional encryption scheme, secret keys are associated with functions and ciphertexts are associated with messages. Given a secret key for a function f and a ciphertext for a message x, a decryptor learns f(x) and nothing else about x. Inner product encryption is a special case of functional encryption where both secret keys and ciphertexts are associated with vectors. The combination of a secret key for a vector x and a ciphertext for a vector y reveal ⟨x,y⟩ and nothing more about y. An inner product encryption scheme is function-hiding if the keys and ciphertexts reveal no additional information about both x and y beyond their inner product.

In the last few years, there has been a flurry of works on the construction of function-hiding inner product encryption, starting with the work of Bishop, Jain, and Kowalczyk (Asiacrypt 2015) to the more recent work of Tomida, Abe, and Okamoto (ISC 2016). In this work, we focus on the practical applications of this primitive. First, we show that the parameter sizes and the run-time complexity of the state-of-the-art construction can be further reduced by another factor of 2, though we compromise by proving security in the generic group model. We then show that function privacy enables a number of applications in biometric authentication, nearest-neighbor search on encrypted data, and single-key two-input functional encryption for functions over small message spaces. Finally, we evaluate the practicality of our encryption scheme by implementing our function-hiding inner product encryption scheme. Using our construction, encryption and decryption operations for vectors of length 50 complete in a tenth of a second in a standard desktop environment.

BibTeX
@inproceedings{KLMMRW18,
  author    = {Sam Kim and Kevin Lewi and Avradip Mandal and
               Hart Montgomery and Arnab Roy and David J. Wu},
  title     = {Function-Hiding Inner Product Encryption is Practical},
  booktitle = {{SCN}},
  year      = {2018}
}
Multi-Theorem Preprocessing NIZKs from Lattices
PDF Video
Sam Kim and David J. Wu
Crypto 2018
Journal of Cryptology 2020
Best Young-Researcher Paper AwardInvited to Journal of Cryptology
Resources
Abstract

Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography. Numerous NIZK constructions are known in both the random oracle and the common reference string (CRS) models. In the CRS model, there exist constructions from several classes of cryptographic assumptions such as trapdoor permutations, pairings, and indistinguishability obfuscation. Notably absent from this list, however, are constructions from standard lattice assumptions. While there has been partial progress in realizing NIZKs from lattices for specific languages, constructing NIZK proofs (and arguments) for all of NP from standard lattice assumptions remains open.

In this work, we make progress on this problem by giving the first construction of a multi-theorem NIZK for NP from standard lattice assumptions in the preprocessing model. In the preprocessing model, a (trusted) setup algorithm generates proving and verification keys. The proving key is needed to construct proofs and the verification key is needed to check proofs. In the multi-theorem setting, the proving and verification keys should be reusable for an unbounded number of theorems without compromising soundness or zero- knowledge. Existing constructions of NIZKs in the preprocessing model (or even the designated-verifier model) that rely on weaker assumptions like one-way functions or oblivious transfer are only secure in a single-theorem setting. Thus, constructing multi-theorem NIZKs in the preprocessing model does not seem to be inherently easier than constructing them in the CRS model.

We begin by constructing a multi-theorem preprocessing NIZK directly from context-hiding homomorphic signatures. Then, we show how to efficiently implement the preprocessing step using a new cryptographic primitive called blind homomorphic signatures. This primitive may be of independent interest. Finally, we show how to leverage our new lattice-based preprocessing NIZKs to obtain new malicious-secure MPC protocols purely from standard lattice assumptions.

BibTeX (Conference)
@inproceedings{KW18,
  author     = {Sam Kim and David J. Wu},
  title      = {Multi-Theorem Preprocessing {NIZKs} from Lattices},
  booktitle  = {{CRYPTO}},
  year       = {2018}
}
BibTeX (Journal)
@article{KW20,
  author     = {Sam Kim and David J. Wu},
  title      = {Multi-Theorem Preprocessing {NIZKs} from Lattices},
  journal    = {J. Cryptology},
  volume     = {33},
  number     = {3},
  pages      = {619--702},
  year       = {2020}
}
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs
PDF Video
Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu
Eurocrypt 2018
Resources
Abstract

Succinct non-interactive arguments (SNARGs) enable verifying NP computations with significantly less complexity than that required for classical NP verification. In this work, we focus on simultaneously minimizing the proof size and the prover complexity of SNARGs. Concretely, for a security parameter \( \lambda \), we measure the asymptotic cost of achieving soundness error \( 2^{-\lambda} \) against provers of size \( 2^\lambda \). We say a SNARG is quasi-optimally succinct if its proof length is \( \tilde{O}(\lambda) \), and that it is quasi-optimal, if moreover, its prover complexity is only polylogarithmically greater than the running time of the classical NP prover. We show that this definition is the best we could hope for assuming that NP does not have succinct proofs. Our definition strictly strengthens the previous notion of quasi-optimality introduced in the work of Boneh et al. (Eurocrypt 2017).

This work gives the first quasi-optimal SNARG for Boolean circuit satisfiability from a concrete cryptographic assumption. Our construction takes a two-step approach. The first is an information-theoretic construction of a quasi-optimal linear multi-prover interactive proof (linear MIP) for circuit satisfiability. Then, we describe a generic cryptographic compiler that transforms our quasi-optimal linear MIP into a quasi-optimal SNARG by relying on the notion of linear-only vector encryption over rings introduced by Boneh et al. Combining these two primitives yields the first quasi-optimal SNARG based on linear-only vector encryption. Moreover, our linear MIP construction leverages a new robust circuit decomposition primitive that allows us to decompose a circuit satisfiability instance into several smaller circuit satisfiability instances. This primitive may be of independent interest.

Finally, we consider (designated-verifier) SNARGs that provide optimal succinctness for a non-negligible soundness error. Concretely, we put forward the notion of “1-bit SNARGs” that achieve soundness error 1/2 with only one bit of proof. We first show how to build 1-bit SNARGs from indistinguishability obfuscation, and then show that 1-bit SNARGs also suffice for realizing a form of witness encryption. The latter result highlights a two-way connection between the soundness of very succinct argument systems and powerful forms of encryption.

BibTeX
@inproceedings{BISW18,
  author     = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu},
  title      = {Quasi-Optimal {SNARGs} via Linear Multi-Prover Interactive Proofs},
  booktitle  = {{EUROCRYPT}},
  year       = {2018}
}
Secure Genome-Wide Association Analysis using Multiparty Computation
PDF GitHub
Hyunghoon Cho, David J. Wu, and Bonnie Berger
Nature Biotechnology 2018
Resources
Media Coverage
Abstract

Most sequenced genomes are currently stored in strict access-controlled repositories. Free access to these data could improve the power of genome-wide association studies (GWAS) to identify disease-causing genetic variants and aid the discovery of new drug targets. However, concerns over genetic data privacy may deter individuals from contributing their genomes to scientific studies and could prevent researchers from sharing data with the scientific community. Although cryptographic techniques for secure data analysis exist, none scales to computationally intensive analyses, such as GWAS. Here we describe a protocol for large-scale genome-wide analysis that facilitates quality control and population stratification correction in 9K, 13K, and 23K individuals while maintaining the confidentiality of underlying genotypes and phenotypes. We show the protocol could feasibly scale to a million individuals. This approach may help to make currently restricted data available to the scientific community and could potentially enable secure genome crowdsourcing, allowing individuals to contribute their genomes to a study without compromising their privacy.

BibTeX
@article{CWB18,
  author     = {Hyunghoon Cho and David J. Wu and Bonnie Berger},
  title      = {Secure Genome-Wide Association Analysis using Multiparty Computation},
  journal    = {Nature Biotechnology},
  volume     = {36},
  number     = {6},
  pages      = {547--551},
  year       = {2018}
}
2017
Access Control Encryption for General Policies from Standard Assumptions
PDF Video
Sam Kim and David J. Wu
Asiacrypt 2017
Resources
Abstract

Functional encryption enables fine-grained access to encrypted data. In many scenarios, however, it is important to control not only what users are allowed to read (as provided by traditional functional encryption), but also what users are allowed to send. Recently, Damgård et al. (TCC 2016) introduced a new cryptographic framework called access control encryption (ACE) for restricting information flow within a system in terms of both what users can read as well as what users can write. While a number of access control encryption schemes exist, they either rely on strong assumptions such as indistinguishability obfuscation or are restricted to simple families of access control policies.

In this work, we give the first ACE scheme for arbitrary policies from standard assumptions. Our construction is generic and can be built from the combination of a digital signature scheme, a predicate encryption scheme, and a (single-key) functional encryption scheme that supports randomized functionalities. All of these primitives can be instantiated from standard assumptions in the plain model, and so, we obtain the first ACE scheme capable of supporting general policies from standard assumptions. One possible instantiation of our construction relies upon standard number-theoretic assumptions (namely, the DDH and RSA assumptions) and standard lattice assumptions (namely, LWE). Finally, we conclude by introducing several extensions to the ACE framework to support dynamic and more fine-grained access control policies.

BibTeX
@inproceedings{KW17b,
  author     = {Sam Kim and David J. Wu},
  title      = {Access Control Encryption for General Policies from Standard Assumptions},
  booktitle  = {{ASIACRYPT}},
  year       = {2017}
}
Constrained Keys for Invertible Pseudorandom Functions
PDF Slides
Dan Boneh, Sam Kim, and David J. Wu
TCC 2017
Resources
Abstract

A constrained pseudorandom function (PRF) is a secure PRF for which one can generate constrained keys that can only be used to evaluate the PRF on a subset of the domain. Constrained PRFs are used widely, most notably in applications of indistinguishability obfuscation (iO). In this paper we show how to constrain an invertible PRF (IPF), which is significantly harder. An IPF is a secure injective PRF accompanied by an inversion algorithm. A constrained key for an IPF can only be used to evaluate the IPF on a subset S of the domain, and to invert the IPF on the image of S. We first define the notion of a constrained IPF and then give two main constructions: one for puncturing an IPF and the other for (single-key) circuit constraints. Both constructions rely on recent work on private constrained PRFs. We also show that constrained pseudorandom permutations for many classes of constraints are impossible under our definition.

BibTeX
@inproceedings{BKW17,
  author    = {Dan Boneh and Sam Kim and David J. Wu},
  title     = {Constrained Keys For Invertible Pseudorandom Functions},
  booktitle = {{TCC}},
  year      = {2017}
}
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
PDF Video
Sam Kim and David J. Wu
Crypto 2017
Journal of Cryptology 2021
Best Young-Researcher Paper AwardInvited to Journal of Cryptology
Resources
Abstract

A software watermarking scheme allows one to embed a “mark” into a program without significantly altering the behavior of the program. Moreover, it should be difficult to remove the watermark without destroying the functionality of the program. Recently, Cohen et al. (STOC 2016) and Boneh et al. (PKC 2017) showed how to watermark cryptographic functions such as PRFs using the full power of general-purpose indistinguishability obfuscation. Notably, in their constructions, the watermark remains intact even against arbitrary removal strategies. A natural question is whether we can build watermarking schemes from standard assumptions that achieve this strong mark-unremovability property.

We give the first construction of a watermarkable family of PRFs that satisfy this strong mark-unremovability property from standard lattice assumptions (namely, the learning with errors (LWE) and the one-dimensional short integer solution (SIS) problems). As part of our construction, we introduce a new cryptographic primitive called a translucent PRF. Next, we give a concrete construction of a translucent PRF family from standard lattice assumptions. Finally, we show that using our new lattice-based translucent PRFs, we obtain the first watermarkable family of PRFs with strong unremovability against arbitrary strategies from standard assumptions.

BibTeX (Conference)
@inproceedings{KW17,
  author     = {Sam Kim and David J. Wu},
  title      = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  booktitle  = {{CRYPTO}},
  year       = {2017}
}
BibTeX (Journal)
@article{KW21,
  author     = {Sam Kim and David J. Wu},
  title      = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  journal    = {J. Cryptology},
  volume     = {34},
  number     = {28},
  pages      = {1--76},
  year       = {2021}
}
Deriving Genomic Diagnoses Without Revealing Patient Genomes
PDF Video GitHub
Science 2017
Resources
Media Coverage
Abstract

Patient genomes are interpretable only in the context of other genomes; however, genome sharing enables discrimination. Thousands of monogenic diseases have yielded definitive genomic diagnoses and potential gene therapy targets. Here we show how to provide such diagnoses while preserving participant privacy through the use of secure multiparty computation. In multiple real scenarios (small patient cohorts, trio analysis, two-hospital collaboration), we used our methods to identify the causal variant and discover previously unrecognized disease genes and variants while keeping up to 99.7% of all participants’ most sensitive genomic information private.

BibTeX
@article{JWBBB17,
  author     = {Karthik A. Jagadeesh and David J. Wu and Johannes A. Birgmeier and Dan Boneh and Gill Bejerano},
  title      = {Deriving Genomic Diagnoses Without Revealing Patient Genomes},
  journal    = {Science},
  volume     = {357},
  number     = {6352},
  pages      = {692--695},
  year       = {2017}
}
Quantum Operating Systems
PDF
Henry Corrigan-Gibbs, David J. Wu, and Dan Boneh
HotOS 2017
Resources
Abstract

If large-scale quantum computers become commonplace, the operating system will have to provide novel abstractions to capture the power of this bizarre new hardware. In this paper, we consider this and other systems-level issues that quantum computers would raise, and we demonstrate that these machines would offer surprising speed-ups for a number of everyday systems tasks, such as unit testing and CPU scheduling.

BibTeX
@inproceedings{CWB17,
  author     = {Henry Corrigan-Gibbs and David J. Wu and Dan Boneh},
  title      = {Quantum Operating Systems},
  booktitle  = {Workshop on Hot Topics in Operating Systems ({HotOS})},
  year       = {2017}
}
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
PDF Video
Dan Boneh, Yuval Ishai, Amit Sahai, and David J. Wu
Eurocrypt 2017
Resources
Abstract

Succinct non-interactive arguments (SNARGs) enable verifying NP computations with substantially lower complexity than that required for classical NP verification. In this work, we first construct a lattice-based SNARG candidate with quasi-optimal succinctness (where the argument size is quasilinear in the security parameter). Further extension of our methods yields the first SNARG (from any assumption) that is quasi-optimal in terms of both prover overhead (polylogarithmic in the security parameter) as well as succinctness. Moreover, because our constructions are lattice-based, they plausibly resist quantum attacks. Central to our construction is a new notion of linear-only vector encryption which is a generalization of the notion of linear-only encryption introduced by Bitansky et al. (TCC 2013). We conjecture that variants of Regev encryption satisfy our new linear-only definition. Then, together with new information-theoretic approaches for building statistically-sound linear PCPs over small finite fields, we obtain the first quasi-optimal SNARGs.

We then show a surprising connection between our new lattice-based SNARGs and the concrete efficiency of program obfuscation. All existing obfuscation candidates currently rely on multilinear maps. Among the constructions that make black-box use of the multilinear map, obfuscating a circuit of even moderate depth (say, 100) requires a multilinear map with multilinearity degree in excess of 2100. In this work, we show that an ideal obfuscation of both the decryption function in a fully homomorphic encryption scheme and a variant of the verification algorithm of our new lattice-based SNARG yields a general-purpose obfuscator for all circuits. Finally, we give some concrete estimates needed to obfuscate this “obfuscation-complete” primitive. We estimate that at 80-bits of security, a (black-box) multilinear map with ≈212 levels of multilinearity suffices. This is over 280 times more efficient than existing candidates, and thus, represents an important milestone towards implementable program obfuscation for all circuits.

BibTeX
@inproceedings{BISW17,
  author     = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu},
  title      = {Lattice-Based {SNARGs} and Their Application to More Efficient Obfuscation},
  booktitle  = {{EUROCRYPT}},
  year       = {2017}
}
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
PDF Video
Shashank Agrawal and David J. Wu
Eurocrypt 2017
Resources
Abstract

Functional encryption (FE) enables fine-grained control of sensitive data by allowing users to only compute certain functions for which they have a key. The vast majority of work in FE has focused on deterministic functions, but for several applications such as privacy-aware auditing, differentially-private data release, proxy re-encryption, and more, the functionality of interest is more naturally captured by a randomized function. Recently, Goyal et al. (TCC 2015) initiated a formal study of FE for randomized functionalities with security against malicious encrypters, and gave a selectively secure construction from indistinguishability obfuscation. To date, this is the only construction of FE for randomized functionalities in the public-key setting. This stands in stark contrast to FE for deterministic functions which has been realized from a variety of assumptions.

Our key contribution in this work is a generic transformation that converts any general-purpose, public-key FE scheme for deterministic functionalities into one that supports randomized functionalities. Our transformation uses the underlying FE scheme in a black-box way and can be instantiated using very standard number-theoretic assumptions (for instance, the DDH and RSA assumptions suffice). When applied to existing FE constructions, we obtain several adaptively-secure, public-key functional encryption schemes for randomized functionalities with security against malicious encrypters from many different assumptions such as concrete assumptions on multilinear maps, indistinguishability obfuscation, and in the bounded-collusion setting, the existence of public-key encryption, together with standard number-theoretic assumptions.

Additionally, we introduce a new, stronger definition for malicious security as the existing one falls short of capturing an important class of correlation attacks. In realizing this definition, our compiler combines ideas from disparate domains like related-key security for pseudorandom functions and deterministic encryption in a novel way. We believe that our techniques could be useful in expanding the scope of new variants of functional encryption (e.g., multi-input, hierarchical, and others) to support randomized functionalities.

BibTeX
@inproceedings{AW17,
  author     = {Shashank Agrawal and David J. Wu},
  title      = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions},
  booktitle  = {{EUROCRYPT}},
  year       = {2017}
}
Constraining Pseudorandom Functions Privately
PDF Video
Dan Boneh, Kevin Lewi, and David J. Wu
PKC 2017
Resources
Abstract

In a constrained pseudorandom function (PRF), the master secret key can be used to derive constrained keys, where each constrained key k is constrained with respect to some Boolean circuit C. A constrained key k can be used to evaluate the PRF on all inputs x for which C(x) = 1. In almost all existing constrained PRF constructions, the constrained key k reveals its constraint C.

In this paper we introduce the concept of private constrained PRFs, which are constrained PRFs with the additional property that a constrained key does not reveal its constraint. Our main notion of privacy captures the intuition that an adversary, given a constrained key k for one of two circuits C0 and C1, is unable to tell which circuit is associated with the key k. We show that constrained PRFs have natural applications to searchable symmetric encryption, cryptographic watermarking, and much more.

To construct private constrained PRFs we first demonstrate that our strongest notions of privacy and functionality can be achieved using indistinguishability obfuscation. Then, for our main constructions, we build private constrained PRFs for bit-fixing constraints and for puncturing constraints from concrete algebraic assumptions.

BibTeX
@inproceedings{BLW17,
  author    = {Dan Boneh and Kevin Lewi and David J. Wu},
  title     = {Constraining Pseudorandom Functions Privately},
  booktitle = {International Conference on Practice and Theory in Public-Key Cryptography ({PKC})},
  year      = {2017}
}
2016
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
PDF Video GitHub
Kevin Lewi and David J. Wu
CCS 2016
Resources
Abstract

In the last few years, there has been significant interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database using an order-preserving encryption (OPE) scheme (i.e., an encryption scheme that supports comparisons over encrypted values). However, Naveed et al. (CCS 2015) recently showed that OPE-encrypted databases are extremely vulnerable to “inference attacks.”

In this work, we consider a related primitive called order-revealing encryption (ORE), which is a generalization of OPE that allows for stronger security. We begin by constructing a new ORE scheme for small message spaces which achieves the “best-possible” notion of security for ORE. Next, we introduce a “domain-extension” technique and apply it to our small-message-space ORE. While our domain-extension technique does incur a loss in security, the resulting ORE scheme we obtain is more secure than all existing (stateless and non-interactive) OPE and ORE schemes which are practical. All of our constructions rely only on symmetric primitives. As part of our analysis, we also give a tight lower bound for OPE and show that no efficient OPE scheme can satisfy best-possible security if the message space contains just three messages. Thus, achieving strong notions of security for even small message spaces requires moving beyond OPE.

Finally, we examine the properties of our new ORE scheme and show how to use it to construct an efficient range query protocol that is robust against the inference attacks of Naveed et al. We also give a full implementation of our new ORE scheme, and show that not only is our scheme more secure than existing OPE schemes, it is also faster: encrypting a 32-bit integer requires just 55 microseconds, which is more than 65 times faster than existing OPE schemes.

BibTeX
@inproceedings{LW16,
  author    = {Kevin Lewi and David J. Wu},
  title     = {Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds},
  booktitle = {ACM Conference on Computer and Communications Security ({ACM} {CCS})},
  year      = {2016}
}
Privacy, Discovery, and Authentication for the Internet of Things
PDF Slides
David J. Wu, Ankur Taly, Asim Shankar, and Dan Boneh
ESORICS 2016
Outstanding Paper Award
Resources
Abstract

Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low Energy have gained widespread adoption across both IoT and mobile devices, most of these protocols do not offer any form of privacy control for the service, and often leak sensitive information such as service type, device hostname, device owner's identity, and more in the clear.

To address the need for better privacy in both the IoT and the mobile landscape, we develop two protocols for private service discovery and private mutual authentication. Our protocols provide private and authentic service advertisements, zero round-trip (0-RTT) mutual authentication, and are provably secure in the Canetti-Krawczyk key-exchange model. In contrast to alternatives, our protocols are lightweight and require minimal modification to existing key-exchange protocols. We integrate our protocols into an existing open-source distributed applications framework, and provide benchmarks on multiple hardware platforms: Intel Edisons, Raspberry Pis, smartphones, laptops, and desktops. Finally, we discuss some privacy limitations of the Apple AirDrop protocol (a peer-to-peer file sharing mechanism) and show how to improve the privacy of Apple AirDrop using our private mutual authentication protocol.

BibTeX
@inproceedings{WTSB16,
  author    = {David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh},
  title     = {Privacy, Discovery, and Authentication for the Internet of Things},
  booktitle = {European Symposium on Research in Computer Security ({ESORICS})},
  year      = {2016}
}
Privately Evaluating Decision Trees and Random Forests
PDF Video
PETS 2016
Resources
Abstract

Decision trees and random forests are common classifiers with widespread use. In this paper, we develop two protocols for privately evaluating decision trees and random forests. We operate in the standard two-party setting where the server holds a model (either a tree or a forest), and the client holds an input (a feature vector). At the conclusion of the protocol, the client learns only the model's output on its input and a few generic parameters concerning the model; the server learns nothing. The first protocol we develop provides security against semi-honest adversaries. We then give an extension of the semi-honest protocol that is robust against malicious adversaries. We implement both protocols and show that both variants are able to process trees with several hundred decision nodes in just a few seconds and a modest amount of bandwidth. Compared to previous semi-honest protocols for private decision tree evaluation, we demonstrate a tenfold improvement in computation and bandwidth.

BibTeX
@article{WFNL15,
  author  = {David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter},
  title   = {Privately Evaluating Decision Trees and Random Forests},
  journal = {Proceedings on Privacy Enhancing Technologies ({PoPETs})},
  volume  = {2016},
  number  = {4},
  pages   = {335--355},
  year    = {2016}
}
Practical Order-Revealing Encryption with Limited Leakage
PDF Video GitHub
FSE 2016
Resources
Abstract

In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts that preserve the order of their plaintexts. Order-preserving encryption schemes have been studied intensely in the last decade, and yet not much is known about the security of these schemes. Very recently, Boneh et al. (Eurocrypt 2015) introduced a generalization of order-preserving encryption, called order-revealing encryption, and presented a construction which achieves this notion with best-possible security. Because their construction relies on multilinear maps, it is too impractical for most applications and therefore remains a theoretical result.

In this work, we build efficiently implementable order-revealing encryption from pseudorandom functions. We present the first efficient order-revealing encryption scheme which achieves a simulation-based security notion with respect to a leakage function that precisely quantifies what is leaked by the scheme. In fact, ciphertexts in our scheme are only about 1.6 times longer than their plaintexts. Moreover, we show how composing our construction with existing order-preserving encryption schemes results in order-revealing encryption that is strictly more secure than all preceding order-preserving encryption schemes.

BibTeX
@inproceedings{CLWW16,
  author    = {Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu},
  title     = {Practical Order-Revealing Encryption with Limited Leakage},
  booktitle = {Fast Software Encryption ({FSE})},
  year      = {2016}
}
Privacy-Preserving Shortest Path Computation
PDF Slides
David J. Wu, Joe Zimmerman, Jérémy Planul, and John C. Mitchell
NDSS 2016
Resources
Abstract

Navigation is one of the most popular cloud computing services. But in virtually all cloud-based navigation systems, the client must reveal her location and destination to the cloud service provider in order to learn the fastest route. In this work, we present a cryptographic protocol for navigation on city streets that provides privacy for both the client's location and the service provider's routing data. Our key ingredient is a novel method for compressing the next-hop routing matrices in networks such as city street maps. Applying our compression method to the map of Los Angeles, for example, we achieve over tenfold reduction in the representation size. In conjunction with other cryptographic techniques, this compressed representation results in an efficient protocol suitable for fully-private real-time navigation on city streets. We demonstrate the practicality of our protocol by benchmarking it on real street map data for major cities such as San Francisco and Washington, D.C.

BibTeX
@inproceedings{WZPM16,
  author    = {David J. Wu and Joe Zimmerman and J{\'{e}}r{\'{e}}my Planul and
               John C. Mitchell},
  title     = {Privacy-Preserving Shortest Path Computation},
  booktitle = {Network and Distributed System Security Symposium ({NDSS})},
  year      = {2016}
}
2013
Private Database Queries using Somewhat Homomorphic Encryption
PDF Slides Code
ACNS 2013
Resources
Abstract

In a private database query system, a client issues queries to a database and obtains the results without learning anything else about the database and without the server learning the query. While previous work has yielded systems that can efficiently support disjunction queries, performing conjunction queries privately remains an open problem. In this work, we show that using a polynomial encoding of the database enables efficient implementations of conjunction queries using somewhat homomorphic encryption. We describe a three-party protocol that supports efficient evaluation of conjunction queries. Then, we present two implementations of our protocol using Paillier's additively homomorphic system as well as Brakerski's somewhat homomorphic cryptosystem. Finally, we show that the additional homomorphic properties of the Brakerski cryptosystem allow us to handle queries involving several thousand elements over a million-record database in just a few minutes, far outperforming the implementation using the additively homomorphic system.

BibTeX
@inproceedings{BGHWW13,
  author    = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and
               David J. Wu},
  title     = {Private Database Queries Using Somewhat Homomorphic Encryption},
  booktitle = {Applied Cryptography and Network Security ({ACNS})},
  year      = {2013}
}
Deep Learning with COTS HPC Systems
PDF
Adam Coates, Brody Huval, Tao Wang, David J. Wu, Andrew Y. Ng, and Bryan Catanzaro
ICML 2013
Resources
Media Coverage
Abstract

Scaling up deep learning algorithms has been shown to lead to increased performance in benchmark tasks and to enable discovery of complex high-level features. Recent efforts to train extremely large networks (with over 1 billion parameters) have relied on cloud-like computing infrastructure and thousands of CPU cores. In this paper, we present technical details and results from our own system based on Commodity Off-The-Shelf High Performance Computing (COTS HPC) technology: a cluster of GPU servers with Infiniband interconnects and MPI. Our system is able to train 1 billion parameter networks on just 3 machines in a couple of days, and we show that it can scale to networks with over 11 billion parameters using just 16 machines. As this infrastructure is much more easily marshaled by others, the approach enables much wider-spread research with extremely large neural networks.

BibTeX
@inproceedings{CHWWCN13,
  author    = {Adam Coates and Brody Huval and Tao Wang and David J. Wu
               and Bryan C. Catanzaro and Andrew Y. Ng},
  title     = {Deep learning with {COTS} {HPC} systems},
  booktitle = {International Conference on Machine Learning ({ICML})},
  year      = {2013}
}
2012
End-to-End Text Recognition with Convolutional Neural Networks
PDF Code
Tao Wang, David J. Wu, Adam Coates, and Andrew Y. Ng
ICPR 2012
Resources
Abstract

Full end-to-end text recognition in natural images is a challenging problem that has received much attention recently. Traditional systems in this area have relied on elaborate models incorporating carefully hand-engineered features or large amounts of prior knowledge. In this paper, we take a different route and combine the representational power of large, multilayer neural networks together with recent developments in unsupervised feature learning, which allows us to use a common framework to train highly-accurate text detector and character recognizer modules. Then, using only simple off- the-shelf methods, we integrate these two modules into a full end-to-end, lexicon-driven, scene text recognition system that achieves state-of-the-art performance on standard benchmarks, namely Street View Text and ICDAR 2003.

BibTeX
@inproceedings{WWCN12,
  author    = {Tao Wang and David J. Wu and Adam Coates and Andrew Y. Ng},
  title     = {End-to-end Text Recognition with Convolutional Neural Networks},
  booktitle = {International Conference on Pattern Recognition ({ICPR})},
  year      = {2012}
}
2011
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning
PDF
Adam Coates, Blake Carpenter, Carl Case, Sanjeev Satheesh, Bipin Suresh, Tao Wang, David J. Wu, and Andrew Y. Ng
ICDAR 2011
Best Student Paper Award
Resources
Abstract

Reading text from photographs is a challenging problem that has received a significant amount of attention. Two key components of most systems are (i) text detection from images and (ii) character recognition, and many recent methods have been proposed to design better feature representations and models for both. In this paper, we apply methods recently developed in machine learning – specifically, large-scale algorithms for learning the features automatically from unlabeled data – and show that they allow us to construct highly effective classifiers for both detection and recognition to be used in a high accuracy end-to-end system.

BibTeX
@inproceedings{CCCSSWWN11,
  author    = {Adam Coates and Blake Carpenter and Carl Case and
               Sanjeev Satheesh and Bipin Suresh and Tao Wang and
               David J. Wu and Andrew Y. Ng},
  title     = {Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning},
  booktitle = {International Conference on Document Analysis and Recognition ({ICDAR})},
  year      = {2011}
}
Theses
Lattice-Based Non-Interactive Argument Systems
PDF Slides
PhD Thesis (2018)
Stanford Computer Science
Advised by Professor Dan Boneh
Resources
Abstract

Non-interactive argument systems are an important building block in many cryptographic protocols. In this work, we begin by studying non-interactive zero-knowledge (NIZK) arguments for general NP languages. In a NIZK argument system, a prover can convince a verifier that a statement is true without revealing anything more about the statement. Today, NIZK arguments can be instantiated from random oracles, or, in the common reference string (CRS) model, from trapdoor permutations, pairings, or indistinguishability obfuscation. Notably absent from this list are constructions from lattice assumptions, and realizing NIZKs (for general NP languages) from lattices has been a longstanding open problem. In this work, we make progress on this problem by giving the first construction of a multi-theorem NIZK argument from standard lattice assumptions in a relaxed model called the preprocessing model, where we additionally assume the existence of a trusted setup algorithm that generates a proving key (used to construct proofs) and a verification key (used to verify proofs). Moreover, by basing hardness on lattice assumptions, our construction gives the first candidate that plausibly resists quantum attacks.

We then turn our attention to constructing succinct non-interactive arguments (SNARGs) for general NP languages. SNARGs enable verifying computations with substantially lower complexity than that required for classic NP verification. Prior to this work, all SNARG constructions relied on random oracles, pairings, or indistinguishability obfuscation. This work gives the first candidate constructions of a lattice-based SNARG in the CRS model. In fact, we show that our new SNARGs satisfy an appealing property called “quasi-optimality,” which means that the SNARG simultaneously minimizes both the prover complexity and the proof size (up to polylogarithmic factors). Our work gives the first quasi-optimal SNARGs from a concrete cryptographic assumption. Again, because of our reliance on lattice-based assumptions, they resist quantum attacks (in contrast to existing pairing-based constructions).

BibTeX
@phdthesis{Wu18,
  author = {David J. Wu},
  title  = {Lattice-Based Non-Interactive Argument Systems},
  school = {Stanford University},
  year   = {2018}
}
End-to-End Text Recognition with Convolutional Neural Networks
PDF
Undergraduate Thesis (2012)
Stanford Computer Science
Advised by Professor Andrew Y. Ng
Resources
Abstract

Full end-to-end text recognition in natural images is a challenging problem that has recently received much attention in computer vision and machine learning. Traditional systems in this area have relied on elaborate models that incorporate carefully hand-engineered features or large amounts of prior knowledge. In this thesis, I describe an alternative approach that combines the representational power of large, multilayer neural networks with recent developments in unsupervised feature learning. This particular approach enables us to train highly accurate text detection and character recognition modules. Because of the high degree of accuracy and robustness of these detection and recognition modules, it becomes possible to integrate them into a full end-to-end, lexicon-driven, scene text recognition system using only simple off-the-shelf techniques. In doing so, we demonstrate state-of-theart performance on standard benchmarks in both cropped-word recognition as well as full end-to-end text recognition.

BibTeX
@misc{Wu13,
  author = {David J. Wu},
  title  = {End-to-End Text Recognition with Convolutional Neural Networks},
  misc   = {Stanford Undergraduate Honors Thesis},
  year   = {2012}
}
Technical Reports
Keeping Patient Phenotypes and Genotypes Private while Seeking Disease Diagnoses
PDF
Resources
Abstract

In an age where commercial entities are allowed to collect and directly profit from large amounts of private information, an age where large data breaches of such organizations are discovered every month, science must strive to offer society viable ways to preserve privacy while benefitting from the power of data sharing. Patient phenotypes and genotypes are critical for building groups of phenotypically-similar patients, identify the gene that best explains their common phenotypes, and ultimately, diagnose a patient with a Mendelian disease. Direct computation over these quantities requires highly-sensitive patient data to be shared openly, compromising patient privacy and opening patients up for discrimination. Existing protocols focus on secure computation over genotype data and only address the final steps of the disease-diagnosis pipeline where phenotypically-similar patients have been identified. However, identifying such patients in a secure and private manner remains open. In this work, we develop secure protocols to maintain patient privacy while computing meaningful operations over both genotypic and phenotypic data for two real scenarios: COHORT DISCOVERY and GENE PRIORITIZATION. Our protocols newly enable a complete and secure end-to-end disease diagnosis pipeline that protects sensitive patient phenotypic and genotypic data.

BibTeX
@article{JWBBB19,
  author  = {Karthik A. Jagadeesh and David J. Wu and Johannes A. Birgmeier and Dan Boneh and Gill Bejerano},
  title   = {Keeping Patient Phenotypes and Genotypes Private
             while Seeking Disease Diagnoses},
  misc    = {Full version available at
             \url{https://biorxiv.org/content/biorxiv/early/2019/08/24/746230}},
  journal = {bioRxiv},
  year    = {2019}
}
Immunizing Multilinear Maps Against Zeroizing Attacks
PDF
Dan Boneh, David J. Wu, and Joe Zimmerman
Resources
Abstract

In recent work Cheon, Han, Lee, Ryu, and Stehle presented an attack on the multilinear map of Coron, Lepoint, and Tibouchi (CLT). They show that given many low-level encodings of zero, the CLT multilinear map can be completely broken, recovering the secret factorization of the CLT modulus. The attack is a generalization of the “zeroizing” attack of Garg, Gentry, and Halevi.

We first strengthen the attack of Cheon, Han, Lee, Ryu, and Stehle by showing that CLT can be broken even without low-level encodings of zero. This strengthening is sufficient to show that the subgroup elimination assumption does not hold for the CLT multilinear map.

We then present a generic defense against this type of “zeroizing” attack. For an arbitrary asymmetric composite-order multilinear map (including CLT), we give a functionality-preserving transformation that ensures that no sequence of map operations will produce valid encodings (below the zero-testing level) whose product is zero. We prove security of our transformation in a generic model of composite-order multilinear maps. Our new transformation rules out “zeroizing” leaving no currently known attacks on the decision linear assumption, subgroup elimination assumption, and other related problems for the CLT multilinear map. Of course, in time, it is possible that different attacks on CLT will emerge.

Update: Since the publication of this work, Coron, Lepoint, and Tibouchi have further strengthened the original attacks of Cheon et al. With the stregthened attack, the mitigations we describe in this work no longer suffice to secure the original CLT multilinear map. However, we have preserved the original exposition of our zero-immunizing transformation (Section 3), since this transformation is of independent interest. Notably, our transformation still rules out low-level zero encodings (Theorem 3.14), and thus provides robustness in the setting of deterministic encodings.

BibTeX
@misc{BWZ14,
  author = {Dan Boneh and David J. Wu and Joe Zimmerman},
  title  = {Immunizing Multilinear Maps Against Zeroizing Attacks},
  misc   = {Full version available at \url{https://eprint.iacr.org/2014/930}},
  year   = {2014}
}
Using Homomorphic Encryption for Large Scale Statistical Analysis
PDF GitHub
David J. Wu and Jacob Haven
Resources
Abstract

The development of fully homomorphic encryption schemes in recent years has generated considerable interest in the field of secure computing. In this paper, we consider the problem of performing statistical analysis on encrypted data. Specifically, we focus on two tasks: computing the mean and variance of univariate and multivariate data as well as performing linear regression on a multidimensional, encrypted corpus. Due to the high overhead of homomorphic computation, previous implementations of similar methods have been restricted to small datasets (on the order of a few hundred to a thousand elements) or data with low dimension (generally 1-4). In this paper, we first construct a working implementation of the scale-invariant leveled homomorphic encryption system in [Bra12]. Then, by taking advantage of batched computation as well as a message encoding technique based on the Chinese Remainder Theorem, we show that it becomes not only possible, but computationally feasible, to perform statistical analysis on encrypted datasets with over four million elements and dimension as high as 24. By using these methods along with some additional optimizations, we demonstrate the viability of using leveled homomorphic encryption for large scale statistical analysis.

BibTeX
@misc{WH12,
  author = {David J. Wu and Jacob Haven},
  title  = {Using Homomorphic Encryption for Large Scale Statistical Analysis},
  year   = {2012}
}
Other Articles
Fully Homomorphic Encryption: Cryptography's Holy Grail
PDF
David J. Wu
ACM XRDS 2015
Resources
Abstract

For over 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography’s holy grail opens the door to many new capabilities in our cloud-centric, data-driven world.

BibTeX
@article{Wu15,
  author    = {David J. Wu},
  title     = {Fully Homomorphic Encryption: Cryptography's Holy Grail},
  journal   = {{ACM} Crossroads},
  volume    = {21},
  number    = {3},
  pages     = {24--29},
  year      = {2015}
}