Daniel Wichs

Associate Professor
Department of Computer Science
Northeastern University

wichs@ccs.neu.edu


About Me    [CV]

I am on sabbatical at MIT during the 2018-2019 academic year.

I am an associate professor at the department of computer science at Northeastern University. I am affiliated with the theory and security groups.
My main research area is cryptography. Some of the topics I work on are: I am also interested in computer security, algorithms, complexity theory, coding theory and information theory.

Prior to joining Northeastern, I was a Josef Raviv Memorial Postdoctoral Fellow at IBM Research T.J. Watson.

I got my PhD in Computer Science at New York University (NYU) in 2011. I was very fortunate to have Yevgeniy Dodis as my advisor.
I got my Bachelor's degree in Mathematics and Master's degree in Computer Science at Stanford University in 2005.

Thanks to the Alfred P. Sloan Foundation for the 2018 Sloan Research Fellowship!
Thanks to the NSF for the 2018 CAREER Award.


Research Group

Students and Postdocs

Visitors

Current

Siyao Guo (Postdoc)
Mor Weiss (Postdoc)

Ariel Hamlin (PhD student)
Giorgos Zirdelis (PhD student)
Willy Quach (PhD student)

Alumni

Ron Rothblum (Postdoc → Professor at Technion)
Alessandra Scafuro (Postdoc → Professor at North Carolina State)                
Zahra Jafargholi (PhD student → Postdoc at Aarhus University)

Saikrishna Badrinarayanan (visiting: 6/2017 - 09/2017)
Willy Quach (visiting: 03/2017 - 09/2017)
Alain Passelegue (visiting: 9/2015 - 01/2016)
Ryo Nishimaki (visiting: 10/2014 - 01/2016)
Pratyay Mukherjee (visiting: 06/2014 - 09/2015)
Pavel Hubacek (visiting 09/2013- 02/2014)
Yevgeniy Dodis (visiting 01/2013- 06/2013 and 06/2017 - current)



Teaching

Spring 2018 CS 7805 - PhD Theory of Computation
Fall 2017 CS 7810: Foundations of Cryptography
Spring 2017 CS 7805 - PhD Theory of Computation
Fall 2016 CS 3800 - Theory of Computation
Fall 2015 CS 7880: Graduate Cryptography (Topics in Theory)
Spring 2015 CS 3800 - Theory of Computation
Fall 2014 CS 3800 - Theory of Computation
Spring 2014 CS 6750 - Cryptography and Communications Security
Fall 2013 CS 3800 - Theory of Computation


Crypto Day

Come to the Charles River Crypto Day! A fun-filled day of cryptography talks held regularly in the Boston/Cambridge area. Co-organized with Ron Rothblum, Yael Tauman Kalai, and Vinod Vaikuntanathan.


Program Committees

General Chair: STOC 2016


Publications    [DBLP], [Scholar]

Preprints

Publications

    2018

  1. Traitor-Tracing from LWE Made Simple and Attribute-Based
    Y.Chen, V. Vaikuntanathan, B. Waters, H. Wee, and D. Wichs,  [pdf]
    TCC 2018

  2. Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
    W. Quach, D. Wichs and G. Zirdelis,  [pdf]
    TCC 2018

  3. Is there an Oblivious RAM Lower Bound for Online Reads?
    M. Weiss and D. Wichs  [pdf]
    TCC 2018

  4. Laconic Function Evaluation and Applications
    W. Quach, H. Wee, and D. Wichs  [pdf]
    FOCS 2018

  5. Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
    Z. Brakerski, A. Jain, I. Komargodski, A. Passelegue and D. Wichs  [pdf]
    SCN 2018

  6. Hardness of Non-Interactive Differential Privacy from One-Way Functions
    L. Kowalczyk, T. Malkin, J. Ullman and D. Wichs  [
    pdf]
    CRYPTO 2018

  7. Non-Interactive Delegation for Low-Space Non-Deterministic Computation
    S. Badrinarayanan, Y. Tauman Kalai, D. Khurana, A. Sahai and D. Wichs  [
    pdf]
    STOC 2018

  8. Multi-Key Searchable Encryption, Revisited
    A. Hamlin, a. shelat, M. Weiss and D. Wichs  [
    pdf]
    PKC 2018

    2017

  9. Adaptively Indistinguishable Garbled Circuits
    Z. Jafargholi, A. Scafuro and D. Wichs  [
    pdf]
    TCC 2017

  10. The Edited Truth
    S. Goldwasser, S. Klein and D. Wichs  [
    pdf]
    TCC 2017

  11. Obfuscating Compute-and-Compare Programs under LWE
    D. Wichs and G. Zirdelis  [
    pdf]
    FOCS 2017

  12. Be Adaptive, Avoid Overcommitting
    Z. Jafargholi, C. Kamath; K. Klein, I. Komargodski, K. Pietrzak, D. Wichs,   [
    pdf]
    CRYPTO 2017

    2016

  13. Adaptive Security of Yao's Garbled Circuits
    Z. Jafargholi, D. Wichs  [
    pdf]
    TCC 2016

  14. From Cryptomania to Obfustopia through Secret-Key Functional Encryption
    N. Bitansky, R. Nishimaki, A. Passelegue, D. Wichs  [
    pdf]
    TCC 2016

  15. Standard Security Does Not Imply Indistinguishability Under Selective Opening
    D. Hofheinz, V. Rao and D. Wichs  [
    pdf]
    TCC 2016

  16. Spooky Encryption and its Applications
    Y. Dodis, S. Halevi, R. Rothblum, D. Wichs  [
    pdf]
    CRYPTO 2016

  17. Adaptively Secure Garbled Circuits from One-Way Functions
    B. Hemenway, Z. Jafargholi, R. Ostrovsky, A. Scafuro and D. Wichs  [
    pdf]
    CRYPTO 2016

  18. A counterexample to the chain rule for conditional HILL entropy
    S. Krenn, K. Pietrzak, A. Wadia, D. Wichs  [
    pdf]
    Computational Complexity Journal

  19. Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
    A. Cohen and J. Holmgren and R. Nishimaki, V. Vaikuntanathan and D. Wichs  [
    pdf]
    STOC 2016

  20. Essentially Optimal Robust Secret Sharing with Maximal Corruptions
    A. Bishop, V. Pastro, R. Rajaraman and D. Wichs  [
    pdf]
    EUROCRYPT 2016
    honorable mention for best paper award (one of top 3 papers)

  21. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    R. Nishimaki, D. Wichs, and M. Zhandry  [
    pdf]
    EUROCRYPT 2016

  22. Two Round Mutliparty Computation via Multi-Key FHE
    P. Mukherjee and D. Wichs  [
    pdf]   [slides]   [video]
    EUROCRYPT 2016

  23. Obfuscating Conjunctions under Entropic Ring LWE
    Z. Brakerski, V. Vaikuntanathan, H. Wee and D. Wichs,
    ITCS 2016

  24. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
    S. Devadas, M. van Dijk, C. Fletcher, L. Ren, E. Shi and D. Wichs  [
    pdf]   [video]
    TCC 2016

  25. Perfect Structure on the Edge of Chaos
    N. Bitansky, O. Paneth and D. Wichs  [
    pdf]
    TCC 2016

    2015

  26. New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
    T. Okamoto, K. Pietrzak, B. Waters and D. Wichs  [
    pdf]
    ASIACRYPT 2015

  27. Leveled Fully Homomorphic Signatures from Standard Lattices
    S. Gorbunov, V. Vaikuntanathan and D. Wichs  [
    pdf]   [slides]   [video]
    STOC 2015

  28. Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
    V. Lyubashevsky and D. Wichs  [
    pdf]
    PKC 2015

  29. Tamper Detection and Continuous Non-Malleable Codes
    Z. Jafargholi and D. Wichs  [
    pdf]   [slides]
    TCC 2015

  30. On the Communication Complexity of Secure Function Evaluation with Long Output
    P. Hubáček and D. Wichs  [
    pdf]   [slides]
    ITCS 2015

    2014

  31. Outsourcing Private RAM Computation
    C. Gentry, S. Halevi, M. Raykova and D. Wichs
    FOCS 2014   [
    pdf]   [slides]   [video]

  32. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
    S. Garg, C. Gentry, S. Halevi and D. Wichs
    CRYPTO 2014  (invited to Algorithmica special issue)  [
    pdf]   [slides]

  33. How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
    Y. Dodis, A. Shamir, N. Stephens-Davidowitz and D. Wichs
    CRYPTO 2014   (invited to Algorithmica special issue)   [
    pdf] (see also [Schneier])

  34. Garbled RAM, Revisited
    C. Gentry, S. Halevi, S. Lu, R. Ostrovsky, M. Raykova and D. Wichs
    EUROCRYPT 2014   (merge of
    [GHRW14] and [LO14])   [slides]

  35. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
    S. Faust, P. Mukherjee, D. Venturi and D. Wichs
    EUROCRYPT 2014   [
    pdf]

  36. Key Derivation without Entropy Waste
    Y. Dodis, K. Pietrzak and D. Wichs
    EUROCRYPT 2014   [
    pdf]

    2013


  37. On Continual Leakage of Discrete Log Representations
    S. Agrawal, Y. Dodis, V. Vaikuntanathan and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  38. Fully Homomorphic Message Authenticators
    R. Gennaro and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  39. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
    Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud and D. Wichs
    CCS 2013   [
    pdf]   (see also [Slashdot] and [Schneier])

  40. Learning with Rounding, Revisited: New Reduction, Properties and Applications
    J. Alwen, S. Krenn, K. Pietrzak and D. Wichs
    CRYPTO 2013   [
    pdf]

  41. Optimizing ORAM and Using it Efficiently for Secure Computation
    C. Gentry, K. Goldman, S. Halevi, C. Jutla, M. Raykova and D. Wichs
    PETS 2013   [
    pdf]

  42. Leakage-Resilient Cryptography from Minimal Assumptions
    C. Hazay, A. López-Alt, H. Wee and D. Wichs
    EUROCRYPT 2013 and Journal of Cryptology   [
    pdf]

  43. Dynamic Proofs of Retrievability via Oblivious RAM
    D. Cash, A. Küpçü and D. Wichs
    EUROCRYPT 2013   [
    pdf] [slides]

  44. Why "Fiat-Shamir for Proofs" Lacks a Proof
    N. Bitansky, D. Dachman-Soled, S. Garg, A. Jain, Y. Tauman Kalai, A. Lopez-Alt and D. Wichs
    TCC 2013  (merge of
    [BGW] and [DJKL])

  45. Barriers in Cryptography with Weak, Correlated and Leaky Sources
    D. Wichs
    ITCS 2013   [
    pdf], [slides]

    2012


  46. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
    G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan and D. Wichs
    EUROCRYPT 2012   (merge
    [AJW] , [LTV])

  47. Message Authentication, Revisited
    Y. Dodis, K. Pietrzak, E. Kiltz and D. Wichs
    EUROCRYPT 2012   [
    pdf]

  48. Counterexamples to Hardness Amplification Beyond Negligible
    Y. Dodis, A. Jain, T. Moran and D. Wichs
    TCC 2012   [
    pdf]   [slides]

    2011


  49. Storing Secrets on Continually Leaky Devices.
    Y. Dodis, A. Lewko, B. Waters and D. Wichs
    FOCS 2011   [
    pdf]   [slides]   [video]

  50. Key-Evolution Schemes Resilient to Space-Bounded Leakage.
    S. Dziembowski, T. Kazana and D. Wichs
    CRYPTO 2011   [
    pdf]

  51. Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions.
    C. Gentry and D. Wichs
    STOC 2011   [
    pdf]   [slides]   [video]

  52. Fully Leakage-Resilient Signatures.
    E. Boyle, G. Segev and D. Wichs
    EUROCRYPT 2011 and Journal of Cryptology (invited paper).  [
    pdf]

  53. One-Time Computable Self-Erasing Functions.
    S. Dziembowski, T. Kazana and D. Wichs
    TCC 2011  [
    pdf]

    2010


  54. Efficient Public-Key Cryptography in the Presence of Key Leakage.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    ASIACRYPT 2010 (invited to the Journal of Cryptology)   [
    pdf]

  55. Cryptography Against Continuous Memory Attacks.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    FOCS 2010   [
    pdf]   [slides]   [video]

  56. Public-Key Encryption in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish and D. Wichs
    EUROCRYPT 2010   [
    pdf]   [slides]

  57. On Symmetric Encryption and Point Obfuscation.
    R. Canetti, Y. Tauman Kalai, M. Varia and D. Wichs
    TCC 2010   [
    pdf]   [slides]

  58. Non-Malleable Codes.
    S. Dziembowski, K. Pietrzak and D. Wichs
    ITCS 2010   [
    pdf]  [slides]

    2009


  59. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
    J. Garay, D. Wichs and H.S. Zhou
    CRYPTO 2009   [
    pdf]

  60. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis and D. Wichs
    CRYPTO 2009   [
    pdf]   [slides]   [video]

  61. Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets.
    Y. Dodis and D. Wichs
    STOC 2009   [
    pdf]  [slides]

  62. Proofs of Retrievability via Hardness Amplification.
    Y. Dodis, S. Vadhan and D. Wichs
    TCC 2009   [
    pdf]   [slides]

  63. Universally Composable Multiparty Computation with Partially Isolated Parties.
    I. Damgård, J.B. Nielsen and D. Wichs
    TCC 2009   [
    pdf]   [slides]

    2008


  64. Isolated Proofs of Knowledge and Isolated Zero Knowledge.
    I. Damgård, J.B. Nielsen and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

  65. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
    R. Cramer, Y. Dodis, S. Fehr, C. Padro and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

Thesis, Surveys

  1. PhD Thesis: Cryptographic Resilience to Continual Information Leakage   [pdf]

  2. Survey: Leakage Resilience and the Bounded Retrieval Model
    Joel Alwen, Y. Dodis and D. Wichs
    ICITS 2009   [pdf]



Honors and Awards



Contact Info and Directions

Office Address: Office #622 ISEC, 805 Columbus Av [map]
Mailing Address: 360 Huntington Av, #622 ISEC, Boston, MA 02115
E-mail: [last-name]@ccs.neu.edu