Steve Lu

ORCID: 0000-0003-1837-8864
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Complexity and Algorithms in Graphs
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Advanced Steganography and Watermarking Techniques
  • Advanced Data Storage Technologies
  • Occupational Health and Performance
  • Distributed systems and fault tolerance
  • Advanced Authentication Protocols Security
  • Optimization and Search Problems
  • Algorithms and Data Compression
  • Blockchain Technology Applications and Security
  • Sports injuries and prevention
  • Benford’s Law and Fraud Detection
  • Adversarial Robustness in Machine Learning
  • Chinese history and philosophy
  • Coding theory and cryptography
  • Occupational Health and Safety Research
  • Bluetooth and Wireless Communication Technologies
  • User Authentication and Security Systems
  • Cryptography and Residue Arithmetic
  • Mobile Crowdsensing and Crowdsourcing

McMaster University
2021

University of California, Los Angeles
2006-2015

University of California, Berkeley
2015

UCLA Health
2006-2014

With the gaining popularity of remote storage (e.g. in Cloud), we consider setting where a small, protected local machine wishes to access data on large, untrusted machine. This was introduced RAM model context software protection by Goldreich and Ostrovsky. A secure Oblivious simulation allows for client, with small (e.g., constant size) memory, hide not only but also sequence locations it accesses (both reads writes) unprotected memory size n.Our main results are as follows:• We analyze...

10.5555/2095116.2095129 article EN 2012-01-17

10.1007/978-3-030-71522-9_300629 preprint EN 2025-01-01

Previous chapter Next Full AccessProceedings Proceedings of the 2012 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)On (In)security Hash-based Oblivious RAM and a New Balancing SchemeEyal Kushilevitz, Steve Lu, Rafail OstrovskyEyal Ostrovskypp.143 - 156Chapter DOI:https://doi.org/10.1137/1.9781611973099.13PDFBibTexSections ToolsAdd to favoritesExport CitationTrack CitationsEmail SectionsAboutAbstract With gaining popularity remote storage (e.g. in Cloud), we consider setting where...

10.1137/1.9781611973099.13 preprint EN 2012-01-17

A well-known concern in the setting of identity based encryption is that PKG all powerful and has to be completely trusted. To mitigate this problem, notion Accountable Authority Identity-Based Encryption (A-IBE) was recently introduced by Goyal. Goyal provided constructions realize A-IBE only white box weak black models. However, security guarantees these models fall short those required practice.

10.1145/1455770.1455824 article EN 2008-10-27

Yao's garbled circuit construction is a very fundamental result in cryptography and recent efficiency optimizations have brought it much closer to practice. However these constructions work only for circuits garbling RAM program involves the inefficient process of first converting into circuit. Towards goal avoiding this inefficiency, Lu Ostrovsky (Eurocrypt 2013) introduced notion "garbled RAM" as method garble programs directly. It can be seen analogue such that, size time takes create...

10.1145/2746539.2746593 article EN 2015-06-03

Garbled RAM, introduced by Lu and Ostrovsky, enables the task of garbling a RAM (Random Access Machine) program directly, there avoiding inefficient process first converting it into circuit. can be seen as analogue Yao's garbled circuit construction, except that known realizations make non-black-box use underlying cryptographic primitives. In this paper we remove limitation provide black-box construction with polylogarithmic overhead. Our scheme allows for multiple programs being executed on...

10.1109/focs.2015.22 article EN 2015-10-01

Recent advances in fast protocols for vector oblivious linear evaluation (VOLE) have inspired a family of new VOLE-based lightweight designated-verifier NIZK (Weng et al., S&P 2021, Baum Crypto Dittmer ITC Yang CCS 2021). In particular, the Line-Point Zero Knowledge (LPZK) protocol al. has advantage being entirely non-cryptographic given single instance random VOLE correlation.

10.1145/3548606.3559385 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

In this paper, we consider a new visual cryptography scheme that allows for sharing of multiple secret images on graphs: are given an arbitrary graph (V,E) where every node and edge assigned image. Images the vertices “public” edges “secret”. The problem considering is how to make construction such when encoded two adjacent printed transparencies overlapped, image corresponding revealed. We define most stringent security guarantees (perfect secrecy) show general all graphs cost (in terms...

10.1007/s10878-009-9241-x article EN cc-by-nc Journal of Combinatorial Optimization 2009-06-17

We show a constant-overhead interactive zero-knowledge (ZK) proof system for RAM programs, that is, ZK in which the communication complexity as well running times of prover and verifier scale linearly size memory N time T underlying program. Besides yielding an asymptotic improvement prior work, our implementation gives concrete performance improvements RAM-based proofs. In particular, supports proofs private read/write accesses to 64~MB (224 32-bit words) using only 34~bytes per access,...

10.1145/3460120.3484800 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

In this work we describe a token-based solution to Contact Tracing via Distributed Point Functions (DPF) and, more generally, Function Secret Sharing (FSS). The key idea behind the is that FSS natively supports secure keyword search on raw sets of keywords without need for processing data structure set membership. Furthermore, functionality enables adding up numerical payloads associated with multiple matches additional interaction. These features make an attractive tool lightweight...

10.48550/arxiv.2012.13053 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Private set intersection (PSI) is one of the most extensively studied instances secure computation. PSI allows two parties to compute their input sets without revealing anything else. Other useful variants include PSI-Payload, where output includes payloads associated with members intersection, and PSI-Sum, sum instead individual ones.

10.1145/3548606.3559378 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07
Coming Soon ...