CIS Lab Team
Hoeteck Wee
Senior Scientist
I am a Senior Scientist at NTT Research, and a CNRS Senior Researcher at ENS, Paris. I received my PhD from UC Berkeley and my BSc from MIT. My research addresses new cryptographic challenges posed by Big Data and the Internet. My recent works focus on advanced encryption schemes that support fine-grained access control and selective computation; I am also a contributor to the TLS 1.3 standard.
Publications
Traitor Tracing with N 1/3 Size Ciphertexts and O(1)-Size Keys from k-Lin
By Junqing Gong, Ji Luo & Hoeteck Wee
EUROCRYPT 2023
- Succinct vector, polynomial, and functional commitments from lattices
By Hoeteck Wee & David J. Wu
EUROCRYPT 2023
- Distributed Broadcast Encryption from Bilinear Groups
By Dimitris Kolonelos, Giulio Malavolta & Hoeteck Wee
IACR Cryptology ePrint Archive 2023
- Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions
By Hoeteck Wee
EUROCRYPT 2022
- Succinct Vector, Polynomial, and Functional Commitments from Lattices
By Hoeteck Wee & David J. Wu
Cryptology ePrint Archive 2022
- Multi-authority ABE from Lattices Without Random Oracles
By Hoeteck Wee, Brent Waters & David J. Wu
TCC 2022
- FABEO: Fast Attribute-Based Encryption with Optimal Security
By Hoeteck Wee & Doreen Riepel
Cryptology ePrint Archive 2022
- Witness Encryption and Null-iO from Evasive LWE
By Hoeteck Wee, Vinod Vaikuntanathan & Daniel Wichs
ASIACRYPT 2022
- Succinct LWE Sampling, Random Polynomials, and Obfuscation
By Hoeteck Wee, Lalita Devadas, Willy Quach, Vinod Vaikuntanathan & Daniel Wichs
TCC 2021
- Candidate Obfuscation via Oblivious LWE Sampling
By Hoeteck Wee & Daniel Wichs
EUROCRYPT 2021
- Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions
By Hoeteck Wee
EUROCRYPT 2021
- Broadcast Encryption with Size N1/3 and More from k-Lin
By Hoeteck Wee
CRYPTO 2021
- ABE for DFA from LWE Against Bounded Collusions, Revisited
By Hoeteck Wee
TCC 2021
- Succinct LWE Sampling, Random Polynomials, and Obfuscation
- Pointproofs: Aggregating Proofs for Multiple Vector Commitments
By Hoeteck Wee, Sergey Gorbunov, Leonid Reyzin & Zhenfei Zhang
CCS 2020
Functional Encryption for Quadratic Functions from k-Lin, Revisited
By Hoeteck Wee
TCC 2020
Information-theoretic 2-round MPC Without Round Collapsing: Adaptive Security, and More
By Hoeteck Wee, Huijia Lin & Tianren Liu
TCC 2020
Time-space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
By Hoeteck Wee, David Cash & Andrew Drucker
CRYPTO 2020
Compact Adaptively Secure ABE for NC¹ from k-Lin
By Hoeteck Wee & Lucas Kowalczyk
J. Cryptol. 2020
Adaptively Secure ABE for DFA from k-Lin and More
By Hoeteck Wee & Junqing Gong
EUROCRYPT 2020
- Inaccessible Entropy II: IE Functions and Universal One-Way Hashing
By Hoeteck Wee, Iftach Haitner, Thomas Holenstein, Omer Reingold & Salil P. Vadhan
Theory Comput. 2020
- Functional Encryption for Attribute-Weighted Sums from k-Lin
By Hoeteck Wee, Michel Abdalla & Junqing Gong
CRYPTO 2020
- New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More
By Hoeteck Wee, Benoît Libert, Alain Passelègue & David J. Wu
EUROCRYPT 2020
- One-One Constrained Pseudorandom Functions
By Hoeteck Wee, Naty Peter & Rotem Tsabary
ITC 2020
- Pixel: Multi-signatures for Consensus
By Hoeteck Wee, Manu Drijvers, Sergey Gorbunov & Gregory Neven
USENIX Security Symposium 2020
- Inaccessible Entropy I: Inaccessible Entropy Generators and Statistically Hiding Commitments from One-Way Functions
By Hoeteck Wee, Iftach Haitner, Omer Reingold & Salil P. Vadhan
CoRR abs 2020
- Pointproofs: Aggregating Proofs for Multiple Vector Commitments
- ABE for DFA from k-Lin
By Hoeteck Wee, Junqing Gong & Brent Waters
CRYPTO 2019
- Obfuscating Simple Functionalities from Knowledge Assumptions
By Hoeteck Wee & Ward Beullens
Public Key Cryptography 2019
- Compact Adaptively Secure ABE for \mathsf NC^1 from k-Lin
By Hoeteck Wee & Lucas Kowalczyk
EUROCRYPT 2019
- Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
By Hoeteck Wee, Yilei Chen, Minki Hhan & Vinod Vaikuntanathan
TCC 2019
- Digital Signatures for Consensus
By Hoeteck Wee & Sergey Gorbunov
IACR Cryptol. ePrint Arch. 2019
- Laconic Function Evaluation and Applications
By Hoeteck Wee, Willy Quach & Daniel Wichs
FOCS 2018
- Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
By Hoeteck Wee, Romain Gay & Lucas Kowalczyk
SCN 2018
- Improved, Black-box, Non-malleable Encryption from Semantic Security
By Hoeteck Wee
Des. Codes Cryptogr. 2018
- A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption
By Hoeteck Wee, Seung Geol Choi, Dana Dachman-Soled & Tal Malkin
J. Cryptol. 2018
- Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding
By Hoeteck Wee, Jie Chen & Junqing Gong
ASIACRYPT 2018
- GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates
By Hoeteck Wee, Yilei Chen, & Vinod Vaikuntanathan
CRYPTO 2018
- Unbounded ABE via Bilinear Entropy Expansion, Revisited
By Hoeteck Wee, Jie Chen, Junqing Gong & Lucas Kowalczyk
EUROCRYPT 2018
- Towards Breaking the Exponential Barrier for General Secret Sharing
By Hoeteck Wee, Tianren Liu & Vinod Vaikuntanathan
EUROCRYPT 2018
- On the Inner Product Predicate and a Generalization of Matching Vector Families
By Hoeteck Wee, Balthazar Bauer & Jevgenijs Vihrovs
FSTTCS 2018
- Traitor-Tracing from LWE Made Simple and Attribute-Based
By Hoeteck Wee, Yilei Chen, Vinod Vaikuntanathan, Brent Waters & Daniel Wichs
TCC 2018
- Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
By Hoeteck Wee, Miguel Ambrona, Gilles Barthe & Romain Gay
CCS 2017
- Conditional Disclosure of Secrets via Non-linear Reconstruction
By Hoeteck Wee, Tianren Liu & Vinod Vaikuntanathan
CRYPTO 2017
- Multi-input Inner-Product Functional Encryption from Pairings
By Hoeteck Wee, Michel Abdalla, Romain Gay & Mariana Raykova
EUROCRYPT 2017
- Attribute-Hiding Predicate Encryption in Bilinear Groups, Revisited
By Hoeteck Wee
TCC 2017
- Private Constrained PRFs (and More) from LWE
By Hoeteck Wee, Zvika Brakerski, Rotem Tsabary & Vinod Vaikuntanathan
TCC 2017
- New Protocols for Conditional Disclosure of Secrets (and More)
By Hoeteck Wee, Tianren Liu & Vinod Vaikuntanathan
Electron. Colloquium Comput. Complex. 2017
- The OPTLS protocol and TLS 1.3
By Hoeteck Wee & Hugo Krawczyk
EuroS&P 2016
- FHE Circuit Privacy Almost for Free
By Hoeteck Wee, Florian Bourse, Rafaël Del Pino & Michele Minelli
CRYPTO 2016
- Tightly CCA-Secure Encryption Without Pairings
By Hoeteck Wee, Romain Gay, Dennis Hofheinz & Eike Kiltz
EUROCRYPT 2016
- Obfuscating Conjunctions under Entropic Ring LWE
By Hoeteck Wee, Zvika Brakerski, Vinod Vaikuntanathan & Daniel Wichs
ITCS 2016
- KDM-Security via Homomorphic Smooth Projective Hashing
By Hoeteck Wee
Public Key Cryptography 2016
- Déjà Q: Encore! Un Petit IBE
By Hoeteck Wee
TCC 2016
- Targeted Homomorphic Attribute-Based Encryption
By Hoeteck Wee, Zvika Brakerski, David Cash & Rotem Tsabary
TCC 2016
- Security Against Related Randomness Attacks via Reconstructive Extractors
By Hoeteck Wee, Kenneth G Paterson, Jacob CN Schuldt & Dale L Sibborn
IMACC 2015
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
By Hoeteck Wee, Fabrice Benhamouda, Geoffroy Couteau & David Pointcheval
CRYPTO 2015
- Structure-Preserving Signatures from Standard Assumptions, Revisited
By Hoeteck Wee, Eike Kiltz & Jiaxin Pan
CRYPTO 2015
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
By Hoeteck Wee, Romain Gay & Iordanis Kerenidis
CRYPTO 2015
- Predicate Encryption for Circuits from LWE
By Hoeteck Wee, Sergey Gorbunov & Vinod Vaikuntanathan
CRYPTO 2015
- Quasi-Adaptive NIZK for Linear Subspaces Revisited
By Hoeteck Wee & Eike Kiltz
EUROCRYPT 2015
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
By Hoeteck Wee, Jie Chen & Romain Gay
EUROCRYPT 2015
- Predicate Encryption for Multi-dimensional Range Queries from Lattices
By Hoeteck Wee, Romain Gay & Pierrick Méaux
Public Key Cryptography 2015
- Semi-adaptive Attribute-based Encryption and Improved Delegation for Boolean
By Hoeteck Wee & Jie Chen
SCN 2014
- Partial Garbling Schemes and Their Applications
By Hoeteck Wee & Yuval Ishai
ICALP 2014
- Shorter IBE and Signatures via Asymmetric Pairings
By Hoeteck Wee, Jie Chen, Hoon Wei Lim, San Ling & Huaxiong Wang
Des. Codes Cryptogr. 2014
- Shorter Identity-based Encryption via Asymmetric Pairings
By Hoeteck Wee, Jie Chen, Hoon Wei Lim, San Ling & Huaxiong Wang
Des. Codes Cryptogr 2014
- Doubly spatial encryption from DBDH
By Hoeteck Wee & Jie Chen
Theor. Comput. Sci. 2014
On the Complexity of UC Commitments
By Hoeteck Wee, Juan A. Garay, Yuval Ishai & Ranjit Kumaresan
EUROCRYPT 2014
Functional Encryption and Its Impact on Cryptography
By Hoeteck Wee
SCN 2014
Dual System Encryption via Predicate Encodings
By Hoeteck Wee
TCC 2014
Dual System Groups and its Applications – Compact HIBE and More
By Hoeteck Wee & Jie Chen
IACR Cryptol. ePrint Arch. 2014
On the Security of the TLS Protocol: A Systematic Analysis
By Hoeteck Wee, Hugo Krawczyk & Kenneth G. Paterson
CRYPTO 2013
Fully, (Almost) Tightly Secure IBE and Dual System Groups
By Hoeteck Wee & Jie Chen
CRYPTO 2013
Functional Encryption: New Perspectives and Lower Bounds
By Hoeteck Wee, Shweta Agrawal, Sergey Gorbunov & Vinod Vaikuntanathan
CRYPTO 2013
- Leakage-Resilient Cryptography from Minimal Assumptions
By Hoeteck Wee, Carmit Hazay, Adriana López-Alt & Daniel Wichs
EUROCRYPT 2013
- Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction
By Hoeteck Wee, S. Dov Gordon, Tal Malkin & Mike Rosulek
EUROCRYPT 2013
- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
By Hoeteck Wee, Seung Geol Choi, Jonathan Katz & Hong-Sheng Zhou
Public Key Cryptography 2013
- Attribute-Based Encryption for Circuits
By Hoeteck Wee, Sergey Gorbunov & Vinod Vaikuntanathan
STOC 2013
- Shorter IBE and Signatures via Asymmetric Pairings
By Hoeteck Wee, Jie Chen, Hoon Wei Lim, San Ling & Huaxiong Wang
Pairing 2012
- Lossy Trapdoor Functions from Homomorphic Reproducible Encryption
By Hoeteck Wee & Seung Geol Choi
Inf. Process. Lett. 2012
- Functional Encryption with Bounded Collusions via Multi-party Computation
By Hoeteck Wee, Sergey Gorbunov, & Vinod Vaikuntanathan
CRYPTO 2012
- Dual Projective Hashing and Its Applications – Lossy Trapdoor Functions and More
By Hoeteck Wee
EUROCRYPT 2012
- Public Key Encryption against Related Key Attacks
By Hoeteck Wee
Public Key Cryptography 2012
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
By Hoeteck Wee, Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan & Panagiotis Voulgaris
Public Key Cryptography 2012
- Efficient Password Authenticated Key Exchange via Oblivious Transfer
By Hoeteck Wee, Ran Canetti, Dana Dachman-Soled & Vinod Vaikuntanathan
Public Key Cryptography 2012
- Threshold and Revocation Cryptosystems via Extractable Hash Proofs
By Hoeteck Wee
EUROCRYPT 2011
- Fuzzy Identity Based Encryption from Lattices
By Hoeteck Wee, Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan & Panagiotis Voulgaris
IACR Cryptol. ePrint Arch. 2011
- Universal One-Way Hash Functions and Average Case Complexity via Inaccessible Entropy
By Hoeteck Wee, Iftach Haitner, Thomas Holenstein, Omer Reingold & Salil Vadhan
EUROCRYPT 2010
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
By Hoeteck Wee
CRYPTO 2010
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
By Hoeteck Wee, Serge Fehr, Dennis Hofheinz & Eike Kiltz
EUROCRYPT 2010
- Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions
By Hoeteck Wee & Rafael Pass
EUROCRYPT 2010
- Black-Box, Round-Efficient Secure Computation via Non-malleability Amplification
By Hoeteck Wee
FOCS 2010
- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
By Hoeteck Wee, S. Dov Gordon, David Xiao & Arkady Yerukhimovich
LATINCRYPT 2010
- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
By Hoeteck Wee, Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
ASIACRYPT 2009
- Zero Knowledge in the Random Oracle Model, Revisited
By Hoeteck Wee
ASIACRYPT 2009
- Inaccessible Entropy
By Hoeteck Wee, Iftach Haitner, Omer Reingold, Salil P. Vadhan & Hoeteck Wee
STOC 2009
- Simple, Black-Box Constructions of Adaptively Secure Protocols
By Hoeteck Wee, Seung Geol Choi, Dana Dachman-Soled & Tal Malkin
TCC 2009
- Black-Box Constructions of Two-Party Protocols from One-Way Function
By Hoeteck Wee & Rafael Pass
TCC 2009
- Optimal Cryptographic Hardness of Learning Monotone Functions.
By Hoeteck Wee, Dana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio & Andrew Wan
ICALP 2008
- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
By Hoeteck Wee, Seung Geol Choi, Dana Dachman-Soled & Tal Malkin
TCC 2008
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
By Hoeteck Wee, Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca Trevisan & Salil P. Vadhan
CRYPTO 2007
- Lower Bounds for Non-interactive Zero-Knowledge
By Hoeteck Wee
TCC 2007
- One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
By Hoeteck Wee
TCC 2007
- Finding Pessiland
By Hoeteck Wee
TCC 2006
- On Obfuscating Point Functions
By Hoeteck Wee
STOC 2005
- More on Noncommutative Polynomial Identity Testing
By Hoeteck Wee
STOC 2005
- Pebbling and Proofs of Work
By Hoeteck Wee
CRYPTO 2005
- On Round-Efficient Argument Systems
By Hoeteck Wee
ICALP 2005
- On Hardness Amplification of One-Way Functions
By Hoeteck Wee, Henry C. Lin & Luca Trevisan
TCC 2005
- Toward Privacy in Public Databases
By Hoeteck Wee, Shuchi Chawla, Cynthia Dwork, Frank McSherry & Adam D. Smith
TCC 2005
- A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
By Hoeteck Wee & Andrej Bogdanov
APPROX-RANDOM 2004
- On Pseudoentropy Versus Compressibility
By Hoeteck Wee & Andrej Bogdanov
Computational Complexity Conference 2004
- Selfish Caching in Distributed Systems: A Game-theoretic Analysis
By Hoeteck Wee, Byung-Gon Chun, Kamalika Chaudhuri, Marco Barreno, Christos H. Papadimitriou & John Kubiatowicz
PODC 2004
- Compressibility Lower Bounds in Oracle Settings
By Hoeteck Wee
Electron. Colloquium Comput. Complex. 2003