Award Abstract # 2140975
CAREER: Foundations of Cryptographic Proof Systems

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF TEXAS AT AUSTIN
Initial Amendment Date: September 17, 2021
Latest Amendment Date: July 15, 2024
Award Number: 2140975
Award Instrument: Continuing Grant
Program Manager: Phillip Regalia
pregalia@nsf.gov
 (703)292-2981
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2021
End Date: July 31, 2026 (Estimated)
Total Intended Award Amount: $500,000.00
Total Awarded Amount to Date: $379,993.00
Funds Obligated to Date: FY 2021 = $70,463.00
FY 2022 = $98,275.00

FY 2023 = $94,392.00

FY 2024 = $116,863.00
History of Investigator:
  • David Wu (Principal Investigator)
    dwu4@cs.utexas.edu
Recipient Sponsored Research Office: University of Texas at Austin
110 INNER CAMPUS DR
AUSTIN
TX  US  78712-1139
(512)471-6424
Sponsor Congressional District: 25
Primary Place of Performance: University of Texas at Austin
TX  US  78759-5316
Primary Place of Performance
Congressional District:
37
Unique Entity Identifier (UEI): V6AFQPN18437
Parent UEI:
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01002526DB NSF RESEARCH & RELATED ACTIVIT
01002223DB NSF RESEARCH & RELATED ACTIVIT

01002122DB NSF RESEARCH & RELATED ACTIVIT

01002425DB NSF RESEARCH & RELATED ACTIVIT

01002324DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 025Z
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Modern cryptography began with the goal of protecting communications over public networks. Today, not only do we communicate with each other remotely, we also delegate our computations to cloud-based services. But can we trust the cloud? Just as cryptographic techniques developed in the last half century provided the foundation for secure communication on the Internet, new techniques provide similar mechanisms for ensuring privacy and integrity of computations. As these technologies mature and see deployment, it is important to carefully study their design and security. The focus of this project is on the theoretical foundations of cryptographic proof systems, a key primitive used to ensure privacy and integrity of computations.

This project conducts a systematic study of the theoretical foundations of cryptographic proof systems that provide privacy and minimize proof size. The focus is on constructions from general and unstructured assumptions. This newly enables cryptographic proof systems from simpler and weaker cryptographic notions. In addition, through the careful study of the foundations of cryptographic proof systems, the project expands our understanding of the broader connections between proof systems and other core cryptographic notions like public-key encryption and witness encryption. By viewing these notions through the lens of cryptographic proof systems, this project paves new paths towards realizing these primitives from simpler cryptographic assumptions. This project also develops new educational material at all levels (from K-12 students to graduate students) focused on applied cryptography and the role it plays in securing digital systems and computations.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Champion, Jeffrey and Wu, David J. "Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments" Annual International Cryptology Conference (CRYPTO) , 2023 Citation Details
Freitag, Cody and Waters, Brent and Wu, David J. "How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More" Annual International Cryptology Conference (CRYPTO) , 2023 Citation Details
Garg, Rachit and Sheridan, Kristin and Waters, Brent and Wu, David J. "Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation" Theory of Cryptography Conference (TCC) , 2022 https://doi.org/10.1007/978-3-031-22318-1_19 Citation Details
Hohenberger, Susan and Lu, George and Waters, Brent and Wu, David J. "Registered Attribute-Based Encryption" Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT) , 2023 https://doi.org/10.1007/978-3-031-30620-4_17 Citation Details
Waters, Brent and Wu, David J "Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation" , 2024 https://doi.org/10.1145/3618260.3649671 Citation Details
Waters, Brent and Wu, David J. "Batch Arguments for NP and More from Standard Bilinear Group Assumptions" Annual International Cryptology Conference (CRYPTO) , 2022 Citation Details
Wee, Hoeteck and Wu, David J "Succinct Functional Commitments for Circuits from k-Lin" , 2024 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page