Daniel Wichs

Associate Professor
Khoury College of Computer Sciences.
Northeastern University
wichs@ccs.neu.edu

Senior Scientist
NTT Research


I am looking for bright and highly motivated PhD students to work with me on exciting new problems in cryptography.
Apply to the CS PhD program at Northeastern for Fall 2023. [more info].

About Me


I am an associate professor at the department of computer science at Northeastern University. I am affiliated with the theory and security groups.
My main research area is cryptography. Some of the topics I work on are: I am also broadly interested in computer security, algorithms, complexity theory, coding theory and information theory.

Prior to joining Northeastern, I was a Josef Raviv Memorial Postdoctoral Fellow at IBM Research T.J. Watson.

I got my PhD in Computer Science at New York University (NYU) in 2011. I was very fortunate to have Yevgeniy Dodis as my advisor.
I got my Bachelor's degree in Mathematics and Master's degree in Computer Science at Stanford University in 2005.

Thanks to the Alfred P. Sloan Foundation for the 2018 Sloan Research Fellowship!
Thanks to the NSF for the 2018 CAREER Award.


Research Group

Students and Postdocs

Visitors

Current

LaKyah Tyner (PhD student, co-advised with abhi shelat)
Ethan Mook (PhD student)
Willy Quach (PhD student)
Wei-Kai Lin (Postdoc)

Alumni

Omer Paneth (Postdoc → Professor at Tel Aviv University)
Siyao Guo (Postdoc → Professor at NYU Shanghai)
Mor Weiss (Postdoc → Postdoc at IDC Herzliya)
Ron Rothblum (Postdoc → Professor at Technion)
Alessandra Scafuro (Postdoc → Professor at North Carolina State)                

Ariel Hamlin (PhD student → Research Scientist and MIT Lincoln Labs)
Giorgos Zirdelis (PhD student → Postdocs at U Maryland)
Zahra Jafargholi (PhD student → Postdoc at Aarhus University)

Saikrishna Badrinarayanan (visiting: 6/2017 - 09/2017)
Willy Quach (visiting: 03/2017 - 09/2017)
Alain Passelegue (visiting: 9/2015 - 01/2016)
Ryo Nishimaki (visiting: 10/2014 - 01/2016)
Pratyay Mukherjee (visiting: 06/2014 - 09/2015)
Pavel Hubacek (visiting 09/2013- 02/2014)
Yevgeniy Dodis (visiting 01/2013- 06/2013 and 06/2017 - current)



Teaching

Spring 2022 CS 4805/7805 Computational Complextity
Fall 2021 CS 7810: Foundations of Cryptography
Spring 2021 CS 4805/7805 - Advanced/Graduate Theory of Computation
Fall 2020 CS 7880 Special Topics in Cryptography
Spring 2020 CS 4770/6750 Cryptgoraphy
Spring 2018 CS 7805 - PhD Theory of Computation
Fall 2017 CS 7810: Foundations of Cryptography
Spring 2017 CS 7805 - PhD Theory of Computation
Fall 2016 CS 3800 - Theory of Computation
Fall 2015 CS 7880: Graduate Cryptography (Topics in Theory)
Spring 2015 CS 3800 - Theory of Computation
Fall 2014 CS 3800 - Theory of Computation
Spring 2014 CS 6750 - Cryptography and Communications Security
Fall 2013 CS 3800 - Theory of Computation



Service

Co-organizer of the Charles River Crypto Day.

Program Chair: ITC 2020
General Chair: STOC 2016

Program Committees


Publications    [DBLP], [Scholar], [IACR]

Preprints

Publications

    2022

  1. Post-Quantum Insecurity from LWE
    A. Lombardi, E. Mook, W. Quach and D. Wichs   [pdf]
    TCC 2022

  2. Witness Encryption and Null-IO from Evasive LWE
    V. Vaikuntanathan, H. Wee and D. Wichs   [pdf]
    ASIACRYPT 2022

  3. Nearly Optimal Property Preserving Hashing
    J. Holmgren, M. Liu, L. Tyner and D. Wichs   [pdf]
    CRYPTO 2022

  4. Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
    S. Badrinarayanan, Y. Ishai, D. Khurana, A. Sahai, and D. Wichs   [pdf]
    ITC 2022

  5. Incompressible Cryptography
    J. Guan, D. Wichs and M. Zhandry   [pdf]
    EUROCRYPT 2022

  6. Authentication in the Bounded Storage Model
    Y. Dodis, W. Quach and D. Wichs   [pdf]
    EUROCRYPT 2022

  7. Small-Box Cryptography
    Y. Dodis, H. Karthikeyan, D. Wichs   [pdf]
    ITCS 2022

    2021

  8. Updatable Public Key Encryption in the Standard Model
    Y. Dodis, H. Karthikeyan, D. Wichs   [pdf]
    TCC 2021

  9. Succinct LWE Sampling, Random Polynomials, and Obfuscation
    L. Devadas, and W. Quach, V. Vaikuntanathan, H. Wee, and D. Wichs   [pdf]
    TCC 2021

  10. Limits on the Adaptive Security of Yao's Garbling
    C. Kamath, K. Klein, K. Pietrzak and D. Wichs   [pdf]
    CRYPTO 2021

  11. Targeted Lossy Functions and Applications
    W. Quach, B. Waters and D. Wichs   [pdf]
    CRYPTO 2021

  12. Candidate Obfuscation via Oblivious LWE Sampling
    H. Wee and D. Wichs   [pdf]
    EUROCRYPT 2021

    2020

  13. Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
    S. Agrawal, D. Wichs, and S. Yamada,  [pdf]
    TCC 2020

  14. Leakage-Resilient Key Exchange and Two-Seed Extractors
    X. Li, F. Ma, W. Quach, and D. Wichs  [pdf]
    CRYPTO 2020

  15. Incompressible Encodings
    T. Moran and D. Wichs  [pdf]
    CRYPTO 2020

  16. Extracting Randomness from Extractor-Dependent Sources
    Y. Dodis, V. Vaikuntanathan, and D. Wichs  [pdf]
    EUROCRYPT 2020

  17. Statistical ZAPR Arguments from Bilinear Maps
    A. Lombardi, V. Vaikuntanathan and D. Wichs  [pdf]
    EUROCRYPT 2020

  18. Two-Round Oblivious Transfer from CDH or LPN
    N. Döttling, S. Garg, M. Hajiabadi, D. Masny and D. Wichs  [pdf]
    EUROCRYPT 2020

  19. Witness Maps and Applications
    S. Chakraborty, M. Prabhakaran, and D. Wichs,  [pdf]
    PKC 2020

    2019

  20. Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
    R. Goyal, W. Quach, B. Waters and D. Wichs  [pdf]
    CRYPTO 2019

  21. Non-Malleable Codes for Decision Trees
    M. Ball, S. Guo and D. Wichs  [pdf]
    CRYPTO 2019

  22. Fully Homomorphic Encryption for RAMs
    A. Hamlin, J. Holmgren, M. Weiss and D. Wichs  [pdf]
    CRYPTO 2019

  23. New Constructions of Reusable Designated-Verifier NIZKs
    A. Lombardi, W. Quach, R. Rothblum, D. Wichs and D. Wu  [pdf]
    CRYPTO 2019

  24. Adaptively Secure MPC with Sublinear Communication Complexity
    R. Cohen, a. shelat and D. Wichs  [pdf]
    CRYPTO 2019

  25. Fiat-Shamir: From Practice to Theory
    R. Canetti, Y. Chen, J. Holmgren, A. Lombardi, G. Rothblum, R. Rothblum, and D. Wichs
    STOC 2019 (Merge of [CCHLRR] and [CLW])

  26. Private Anonymous Data Access
    A. Hamlin, R. Ostrovsky, M. Weiss and D. Wichs  [pdf]
    EUROCRYPT 2019

  27. Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
    Z. Brakerski, V. Lyubashevsky, V. Vaikuntanathan and D. Wichs  [pdf]
    EUROCRYPT 2019

  28. Reusable Designated-Verifier NIZKs for all NP from CDH
    W. Quach, R. Rothblum, and D. Wichs [pdf]
    EUROCRYPT 2019

    2018

  29. Traitor-Tracing from LWE Made Simple and Attribute-Based
    Y.Chen, V. Vaikuntanathan, B. Waters, H. Wee, and D. Wichs,  [pdf]
    TCC 2018

  30. Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
    W. Quach, D. Wichs and G. Zirdelis,  [pdf]
    TCC 2018

  31. Is there an Oblivious RAM Lower Bound for Online Reads?
    M. Weiss and D. Wichs  [pdf]
    TCC 2018

  32. Laconic Function Evaluation and Applications
    W. Quach, H. Wee, and D. Wichs  [pdf]
    FOCS 2018

  33. Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
    Z. Brakerski, A. Jain, I. Komargodski, A. Passelegue and D. Wichs  [pdf]
    SCN 2018

  34. Hardness of Non-Interactive Differential Privacy from One-Way Functions
    L. Kowalczyk, T. Malkin, J. Ullman and D. Wichs  [
    pdf]
    CRYPTO 2018

  35. Non-Interactive Delegation for Low-Space Non-Deterministic Computation
    S. Badrinarayanan, Y. Tauman Kalai, D. Khurana, A. Sahai and D. Wichs  [
    pdf]
    STOC 2018

  36. Multi-Key Searchable Encryption, Revisited
    A. Hamlin, a. shelat, M. Weiss and D. Wichs  [
    pdf]
    PKC 2018

    2017

  37. Adaptively Indistinguishable Garbled Circuits
    Z. Jafargholi, A. Scafuro and D. Wichs  [
    pdf]
    TCC 2017

  38. The Edited Truth
    S. Goldwasser, S. Klein and D. Wichs  [
    pdf]
    TCC 2017

  39. Obfuscating Compute-and-Compare Programs under LWE
    D. Wichs and G. Zirdelis  [
    pdf]
    FOCS 2017

  40. Be Adaptive, Avoid Overcommitting
    Z. Jafargholi, C. Kamath; K. Klein, I. Komargodski, K. Pietrzak, D. Wichs,   [
    pdf]
    CRYPTO 2017

    2016

  41. Adaptive Security of Yao's Garbled Circuits
    Z. Jafargholi, D. Wichs  [
    pdf]
    TCC 2016

  42. From Cryptomania to Obfustopia through Secret-Key Functional Encryption
    N. Bitansky, R. Nishimaki, A. Passelegue, D. Wichs  [
    pdf]
    TCC 2016

  43. Standard Security Does Not Imply Indistinguishability Under Selective Opening
    D. Hofheinz, V. Rao and D. Wichs  [
    pdf]
    TCC 2016

  44. Spooky Encryption and its Applications
    Y. Dodis, S. Halevi, R. Rothblum, D. Wichs  [
    pdf]
    CRYPTO 2016

  45. Adaptively Secure Garbled Circuits from One-Way Functions
    B. Hemenway, Z. Jafargholi, R. Ostrovsky, A. Scafuro and D. Wichs  [
    pdf]
    CRYPTO 2016

  46. A counterexample to the chain rule for conditional HILL entropy
    S. Krenn, K. Pietrzak, A. Wadia, D. Wichs  [
    pdf]
    Computational Complexity Journal

  47. Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
    A. Cohen and J. Holmgren and R. Nishimaki, V. Vaikuntanathan and D. Wichs  [
    pdf]
    STOC 2016

  48. Essentially Optimal Robust Secret Sharing with Maximal Corruptions
    A. Bishop, V. Pastro, R. Rajaraman and D. Wichs  [
    pdf]
    EUROCRYPT 2016
    honorable mention for best paper award (one of top 3 papers)

  49. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    R. Nishimaki, D. Wichs, and M. Zhandry  [
    pdf]
    EUROCRYPT 2016

  50. Two Round Mutliparty Computation via Multi-Key FHE
    P. Mukherjee and D. Wichs  [
    pdf]   [slides]   [video]
    EUROCRYPT 2016

  51. Obfuscating Conjunctions under Entropic Ring LWE
    Z. Brakerski, V. Vaikuntanathan, H. Wee and D. Wichs,
    ITCS 2016

  52. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
    S. Devadas, M. van Dijk, C. Fletcher, L. Ren, E. Shi and D. Wichs  [
    pdf]   [video]
    TCC 2016

  53. Perfect Structure on the Edge of Chaos
    N. Bitansky, O. Paneth and D. Wichs  [
    pdf]
    TCC 2016

    2015

  54. New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
    T. Okamoto, K. Pietrzak, B. Waters and D. Wichs  [
    pdf]
    ASIACRYPT 2015

  55. Leveled Fully Homomorphic Signatures from Standard Lattices
    S. Gorbunov, V. Vaikuntanathan and D. Wichs  [
    pdf]   [slides]   [video]
    STOC 2015

  56. Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
    V. Lyubashevsky and D. Wichs  [
    pdf]
    PKC 2015

  57. Tamper Detection and Continuous Non-Malleable Codes
    Z. Jafargholi and D. Wichs  [
    pdf]   [slides]
    TCC 2015

  58. On the Communication Complexity of Secure Function Evaluation with Long Output
    P. Hubáček and D. Wichs  [
    pdf]   [slides]
    ITCS 2015

    2014

  59. Outsourcing Private RAM Computation
    C. Gentry, S. Halevi, M. Raykova and D. Wichs
    FOCS 2014   [
    pdf]   [slides]   [video]

  60. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
    S. Garg, C. Gentry, S. Halevi and D. Wichs
    CRYPTO 2014  (invited to Algorithmica special issue)  [
    pdf]   [slides]

  61. How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
    Y. Dodis, A. Shamir, N. Stephens-Davidowitz and D. Wichs
    CRYPTO 2014   (invited to Algorithmica special issue)   [
    pdf] (see also [Schneier])

  62. Garbled RAM, Revisited
    C. Gentry, S. Halevi, S. Lu, R. Ostrovsky, M. Raykova and D. Wichs
    EUROCRYPT 2014   (merge of
    [GHRW14] and [LO14])   [slides]

  63. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
    S. Faust, P. Mukherjee, D. Venturi and D. Wichs
    EUROCRYPT 2014   [
    pdf]

  64. Key Derivation without Entropy Waste
    Y. Dodis, K. Pietrzak and D. Wichs
    EUROCRYPT 2014   [
    pdf]

    2013


  65. On Continual Leakage of Discrete Log Representations
    S. Agrawal, Y. Dodis, V. Vaikuntanathan and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  66. Fully Homomorphic Message Authenticators
    R. Gennaro and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  67. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
    Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud and D. Wichs
    CCS 2013   [
    pdf]   (see also [Slashdot] and [Schneier])

  68. Learning with Rounding, Revisited: New Reduction, Properties and Applications
    J. Alwen, S. Krenn, K. Pietrzak and D. Wichs
    CRYPTO 2013   [
    pdf]

  69. Optimizing ORAM and Using it Efficiently for Secure Computation
    C. Gentry, K. Goldman, S. Halevi, C. Jutla, M. Raykova and D. Wichs
    PETS 2013   [
    pdf]

  70. Leakage-Resilient Cryptography from Minimal Assumptions
    C. Hazay, A. López-Alt, H. Wee and D. Wichs
    EUROCRYPT 2013 and Journal of Cryptology   [
    pdf]

  71. Dynamic Proofs of Retrievability via Oblivious RAM
    D. Cash, A. Küpçü and D. Wichs
    EUROCRYPT 2013   [
    pdf] [slides]

  72. Why "Fiat-Shamir for Proofs" Lacks a Proof
    N. Bitansky, D. Dachman-Soled, S. Garg, A. Jain, Y. Tauman Kalai, A. Lopez-Alt and D. Wichs
    TCC 2013  (merge of
    [BGW] and [DJKL])

  73. Barriers in Cryptography with Weak, Correlated and Leaky Sources
    D. Wichs
    ITCS 2013   [
    pdf], [slides]

    2012


  74. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
    G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan and D. Wichs
    EUROCRYPT 2012   (merge
    [AJW] , [LTV])

  75. Message Authentication, Revisited
    Y. Dodis, K. Pietrzak, E. Kiltz and D. Wichs
    EUROCRYPT 2012   [
    pdf]

  76. Counterexamples to Hardness Amplification Beyond Negligible
    Y. Dodis, A. Jain, T. Moran and D. Wichs
    TCC 2012   [
    pdf]   [slides]

    2011


  77. Storing Secrets on Continually Leaky Devices.
    Y. Dodis, A. Lewko, B. Waters and D. Wichs
    FOCS 2011   [
    pdf]   [slides]   [video]

  78. Key-Evolution Schemes Resilient to Space-Bounded Leakage.
    S. Dziembowski, T. Kazana and D. Wichs
    CRYPTO 2011   [
    pdf]

  79. Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions.
    C. Gentry and D. Wichs
    STOC 2011   [
    pdf]   [slides]   [video]

  80. Fully Leakage-Resilient Signatures.
    E. Boyle, G. Segev and D. Wichs
    EUROCRYPT 2011 and Journal of Cryptology (invited paper).  [
    pdf]

  81. One-Time Computable Self-Erasing Functions.
    S. Dziembowski, T. Kazana and D. Wichs
    TCC 2011  [
    pdf]

    2010


  82. Efficient Public-Key Cryptography in the Presence of Key Leakage.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    ASIACRYPT 2010 (invited to the Journal of Cryptology)   [
    pdf]

  83. Cryptography Against Continuous Memory Attacks.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    FOCS 2010   [
    pdf]   [slides]   [video]

  84. Public-Key Encryption in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish and D. Wichs
    EUROCRYPT 2010   [
    pdf]   [slides]

  85. On Symmetric Encryption and Point Obfuscation.
    R. Canetti, Y. Tauman Kalai, M. Varia and D. Wichs
    TCC 2010   [
    pdf]   [slides]

  86. Non-Malleable Codes.
    S. Dziembowski, K. Pietrzak and D. Wichs
    ITCS 2010   [
    pdf]  [slides]

    2009


  87. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
    J. Garay, D. Wichs and H.S. Zhou
    CRYPTO 2009   [
    pdf]

  88. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis and D. Wichs
    CRYPTO 2009   [
    pdf]   [slides]   [video]

  89. Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets.
    Y. Dodis and D. Wichs
    STOC 2009   [
    pdf]  [slides]

  90. Proofs of Retrievability via Hardness Amplification.
    Y. Dodis, S. Vadhan and D. Wichs
    TCC 2009   [
    pdf]   [slides]

  91. Universally Composable Multiparty Computation with Partially Isolated Parties.
    I. Damgård, J.B. Nielsen and D. Wichs
    TCC 2009   [
    pdf]   [slides]

    2008


  92. Isolated Proofs of Knowledge and Isolated Zero Knowledge.
    I. Damgård, J.B. Nielsen and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

  93. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
    R. Cramer, Y. Dodis, S. Fehr, C. Padro and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

Thesis, Surveys

  1. PhD Thesis: Cryptographic Resilience to Continual Information Leakage   [pdf]

  2. Survey: Leakage Resilience and the Bounded Retrieval Model
    Joel Alwen, Y. Dodis and D. Wichs
    ICITS 2009   [pdf]



Honors and Awards



Contact Info and Directions

Office Address: Office #622 ISEC, 805 Columbus Av [map]
Mailing Address: 360 Huntington Av, #622 ISEC, Boston, MA 02115
E-mail: [last-name]@ccs.neu.edu