Steve Lu

Orcid: 0000-0003-1837-8864

Affiliations:
  • Stealth Software Technologies, Inc., Los Angeles, CA, USA
  • UCLA, CA, USA (former)


According to our database1, Steve Lu authored at least 32 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2023

PSI from ring-OLE.
IACR Cryptol. ePrint Arch., 2023

2022
Garbled Circuits With Sublinear Evaluator.
IACR Cryptol. ePrint Arch., 2022

Authenticated Garbling from Simple Correlations.
IACR Cryptol. ePrint Arch., 2022

Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One.
IACR Cryptol. ePrint Arch., 2022

Secure Merge in Linear Time and O(log log N) Rounds.
IACR Cryptol. ePrint Arch., 2022

Streaming and Unbalanced PSI from Function Secret Sharing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

2021
Constant-Overhead Zero-Knowledge for RAM Programs.
IACR Cryptol. ePrint Arch., 2021

2020
Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

2019
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

2018
Computing Statistics from Private Data.
Data Sci. J., 2018

ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2016
High-precision Secure Computation of Satellite Collision Probabilities.
IACR Cryptol. ePrint Arch., 2016

2015
Black-Box Parallel Garbled RAM.
IACR Cryptol. ePrint Arch., 2015

Private Large-Scale Databases with Distributed Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2015

Black-Box Garbled RAM.
Electron. Colloquium Comput. Complex., 2015

2014
Garbled RAM Revisited, Part II.
IACR Cryptol. ePrint Arch., 2014

Garbled RAM From One-Way Functions.
IACR Cryptol. ePrint Arch., 2014

Garbled RAM Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
J. Cryptol., 2013

Distributed Oblivious RAM for Secure Two-Party Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

2012
How to Garble RAM Programs.
IACR Cryptol. ePrint Arch., 2012

Correlated Product Security from Any One-Way Function.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Visual cryptography on graphs.
J. Comb. Optim., 2011

Multi-Server Oblivious RAM.
IACR Cryptol. ePrint Arch., 2011

On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme.
IACR Cryptol. ePrint Arch., 2011

2010
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security.
IACR Cryptol. ePrint Arch., 2010

2009
Attribute-Based Encryption.
Proceedings of the Identity-Based Cryptography, 2009

2008
Black-box accountable authority identity-based encryption.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Verifiable Shuffle of Large Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2007

A Non-interactive Shuffle with Pairing Based Verifiability.
Proceedings of the Advances in Cryptology, 2007

2006
Sequential Aggregate Signatures and Multisignatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2006


  Loading...