David J. Wu

Orcid: 0000-0002-5191-692X

Affiliations:
  • University of Texas at Austin, Department of Computer Science, TX, USA
  • University of Virginia (UVA), Department of Computer Science, Charlottesville, VA, USA (former)
  • Stanford University, CA, USA (former, PhD 2018)


According to our database1, David J. Wu authored at least 76 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model.
IACR Cryptol. ePrint Arch., 2025

Pairing-Based Aggregate Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2025

Succinct Witness Encryption for Batch Languages and Applications.
IACR Cryptol. ePrint Arch., 2025

Pairing-Based Batch Arguments for NP with a Linear-Size CRS.
IACR Cryptol. ePrint Arch., 2025

Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Adaptively-Secure Big-Key Identity-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

New Techniques for Preimage Sampling: Improved NIZKs and More from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Multi-authority Registered Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for sfNP.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Succinct Functional Commitments for Circuits from k-Lin.
IACR Cryptol. ePrint Arch., 2024

A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP.
IACR Cryptol. ePrint Arch., 2024

Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2024

A Hidden-Bits Approach to Black-Box Statistical ZAPs from LWE.
IACR Cryptol. ePrint Arch., 2024

YPIR: High-Throughput Single-Server PIR with Silent Preprocessing.
Proceedings of the 33rd USENIX Security Symposium, 2024

Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Batching Adaptively-Sound SNARGs for NP.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Distributed Broadcast Encryption from Lattices.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Batch Arguments to NIZKs from One-Way Functions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Dot-Product Proofs and Their Applications.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

Succinct Functional Commitments for Circuits from k-sfLin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Reducing the CRS Size in Registered ABE Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

The One-Wayness of Jacobi Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Respire: High-Rate PIR for Databases with Small Records.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Authenticated private information retrieval.
Proceedings of the 32nd USENIX Security Symposium, 2023

Succinct Vector, Polynomial, and Functional Commitments from Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Registered Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Non-interactive Zero-Knowledge from Non-interactive Batch Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Batch Arguments for NP and More from Standard Bilinear Group Assumptions.
IACR Cryptol. ePrint Arch., 2022

Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2022

Multi-authority ABE from Lattices Without Random Oracles.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

SPIRAL: Fast, High-Rate Single-Server PIR via FHE Composition.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Traceable PRFs: Full Collusion Resistance and Active Security.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Avoiding genetic racial profiling in criminal DNA profile databases.
Nat. Comput. Sci., 2021

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Can Verifiable Delay Functions Be Based on Random Oracles?
Proceedings of the 47th International Colloquium on Automata, Languages, and Programming, 2020

New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

On Succinct Arguments and Witness Encryption from Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2019

New Constructions of Reusable Designated-Verifier NIZKs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Watermarking Public-Key Cryptographic Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Lattice-based non-interactive argument systems.
PhD thesis, 2018

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Function-Hiding Inner Product Encryption Is Practical.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Multi-Theorem Preprocessing NIZKs from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Constrained Keys for Invertible Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Constraining Pseudorandom Functions Privately.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Quantum Operating Systems.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Access Control Encryption for General Policies from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Privacy-Preserving Shortest Path Computation.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Practical Order-Revealing Encryption with Limited Leakage.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Privacy, Discovery, and Authentication for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2016, 2016

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Privately Evaluating Decision Trees and Random Forests.
IACR Cryptol. ePrint Arch., 2015

Fully Homomorphic Encryption: Cryptography's holy grail.
XRDS, 2015

2014
Immunizing Multilinear Maps Against Zeroizing Attacks.
IACR Cryptol. ePrint Arch., 2014

2013
Deep learning with COTS HPC systems.
Proceedings of the 30th International Conference on Machine Learning, 2013

Private Database Queries Using Somewhat Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
End-to-end text recognition with convolutional neural networks.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

2011
Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011


  Loading...