Steve Lu

Orcid: 0000-0003-1837-8864

Affiliations:
  • Stealth Software Technologies, Inc., Los Angeles, CA, USA
  • UCLA, CA, USA (former)


According to our database1, Steve Lu authored at least 35 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Linear-Time Secure Merge in O(loglog n) Rounds.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

2024
Approximate PSI with Near-Linear Communication.
IACR Cryptol. ePrint Arch., 2024

Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Secure Merge in Linear Time and O(log log N) Rounds.
IACR Cryptol. ePrint Arch., 2022

Streaming and Unbalanced PSI from Function Secret Sharing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Garbled Circuits with Sublinear Evaluator.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Authenticated Garbling from Simple Correlations.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PSI from Ring-OLE.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Constant-Overhead Zero-Knowledge for RAM Programs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

2019
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

2018
Computing Statistics from Private Data.
Data Sci. J., 2018

ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
Black-Box Parallel Garbled RAM.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
High-Precision Secure Computation of Satellite Collision Probabilities.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Private Large-Scale Databases with Distributed Searchable Symmetric Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Garbled RAM From One-Way Functions.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Black-Box Garbled RAM.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

2014
Garbled RAM Revisited, Part II.
IACR Cryptol. ePrint Arch., 2014

Garbled RAM Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
J. Cryptol., 2013

Distributed Oblivious RAM for Secure Two-Party Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

How to Garble RAM Programs
Proceedings of the Advances in Cryptology, 2013

2012
On the (in)security of hash-based oblivious RAM and a new balancing scheme.
Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012

Correlated Product Security from Any One-Way Function.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Multi-Server Oblivious RAM.
IACR Cryptol. ePrint Arch., 2011

2010
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security.
IACR Cryptol. ePrint Arch., 2010

2009
Attribute-Based Encryption.
Proceedings of the Identity-Based Cryptography, 2009

2008
Visual Cryptography on Graphs.
Proceedings of the Computing and Combinatorics, 14th Annual International Conference, 2008

Black-box accountable authority identity-based encryption.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Verifiable Shuffle of Large Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2007

A Non-interactive Shuffle with Pairing Based Verifiability.
Proceedings of the Advances in Cryptology, 2007

2006
Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006


  Loading...