Latest news!
In September 2023, I joined NYU
as an Assistant Professor in Computer Science at the
NYU Courant
Institute of Mathematical Sciences, and as
Affiliated Interdisciplinary Faculty
at the NYU School of Law.
I am looking for motivated students to work with.
I’m starting a new research group at NYU focused on security, transparency, law, and
policy. My research focuses on technologies in societal context — ranging from
computer-science projects designing new cryptographic systems (to improve
privacy or transparency), to law/policy projects arguing for better regulation
of technology or analyzing existing policies. See the rest of my website (below)
for more background, and please reach out if you’re a prospective student interested in working with me. (A background in either CS or law is useful but not required; we need more diverse perspectives in this field!)
I do academic research
in technology law and policy, cryptography, and computer security.
I think a lot about
security, privacy, and transparency in digital technologies.
I received my J.D. at Harvard Law School,
my Ph.D. in computer science at MIT (advised by Shafi Goldwasser), and my B.A. in computer science at the
University of Cambridge.
My past academic affiliations include the Internet Policy Research
Initiative and the Cryptography
and Information Security Group at MIT (as a
Ph.D. student), the MIT Media Lab’s Digital
Currency Initiative (as a Ph.D.
student and postdoctoral researcher), the Berkman-Klein Center for Internet
& Society at Harvard University (as a fellow and later affiliate),
Cornell Tech’s Digital Life
Initiative (as a postdoctoral fellow), and Columbia University and Columbia Law School (as a postdoctoral
fellow in computer science and law).
In fall 2023, I am teaching:
In spring 2024, I will be teaching a new course,
Digital
Technology Law, at the NYU School of Law.
Guide to Security Research Legal Risks.
In 2020, Kendra Albert and I co-authored A
Researcher's Guide to Some Legal Risks of Security Research (alternate archived link), which was jointly published by the Cyberlaw Clinic at Harvard Law
School and the Electronic Frontier Foundation (EFF).
See our Cyberlaw Clinic blog post here.
- The Right to Vote Securely [published pdf]
Sunoo Park In the University of Colorado Law Review, Spring 2023. - Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries [SSRN] [published pdf]
Aloni Cohen and Sunoo Park In the Harvard Journal of Law and Technology (JOLT), Fall 2018 issue.
Computer Science Publications.
- Scan, Shuffle, Rescan: Two-Prover Election Audits [ePrint]
Douglas W. Jones, Sunoo Park, Ronald L. Rivest, and Adam Sealfon To appear in the 28th Int'l Conference on Financial Cryptography and Data Security (Financial Crypto 2024). - A Systematization of Voter Registration System Security [ePrint] [published pdf]
Jack Cable, Andrés Fábrega, Sunoo Park, and Michael Specter In the Journal of Cybersecurity (2023). - The Superlinearity Problem in Post-Quantum Blockchains [ePrint]
Sunoo Park and Nicholas Spooner In the 27th Int'l Conference on Financial Cryptography and Data Security (Financial Crypto 2023). - Cryptography, Trust, and Privacy: It's Complicated
Ero Balsa, Helen Nissenbaum, and Sunoo Park In the 2nd ACM Symposium on Computer Science and Law (CSLAW 2022). - KeyForge: Non-Attributable Email from Forward-Forgeable Signatures [ePrint]
*Michael Specter, Sunoo Park, and Matthew Green In the 30th USENIX Security Symposium (USENIX Security 2021). - Going from Bad to Worse: from Internet Voting to Blockchain Voting [published pdf]
*Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Rivest In the Journal of Cybersecurity (2021). - Fully Deniable Interactive Encryption [ePrint]
Ran Canetti, Sunoo Park, and Oxana Poburinnaya In the 20th Annual Int'l Cryptology Conference (CRYPTO 2020). - Data Structures Meet Cryptography: 3SUM with Preprocessing [arXiv]
Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, and Vinod Vaikuntanathan In the 52nd ACM Symposium on the Theory of Computing (STOC 2020). - It Wasn't Me! Repudiability and Unclaimability of Ring Signatures [ePrint]
Sunoo Park and Adam Sealfon In the 39th Annual Int'l Cryptology Conference (CRYPTO 2019). - How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt [ePrint]
Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan In the 10th Innovations in Theoretical Computer Science conference (ITCS 2019). - Static-Memory-Hard Functions and Modeling the Cost of Space vs. Time [ePrint]
Thaddeus Dryja, Quanquan C. Liu, and Sunoo Park In the 16th IACR Theory of Cryptography Conference (TCC 2018). - Practical Accountability of Secret Processes [ePrint]
*Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, and Daniel J. Weitzner In the 27th USENIX Security Symposium (USENIX Security 2018). - Proactive Secure Multiparty Computation with a Dishonest Majority
Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, and Moti Yung In the 11th Conference on Security and Cryptography for Networks (SCN 2018). - SpaceMint: A Cryptocurrency Based on Proofs of Space [pdf] [ePrint]
*Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, and Krzysztof Pietrzak In the 22nd Int'l Conference on Financial Cryptography and Data Security (Financial Crypto 2018). - Public Accountability vs. Secret Laws: Can They Coexist? [ePrint]
Shafi Goldwasser and Sunoo Park In the 16th Workshop on Privacy in the Electronic Society (WPES) at CCS 2017. - Towards Secure Quadratic Voting [pdf] [ePrint]
Sunoo Park and Ronald L. Rivest In Public Choice 2017. - How to Incentivize Data-Driven Collaboration Among Competing Parties [pdf] [ePrint] [arXiv]
Pablo Daniel Azar, Shafi Goldwasser, and Sunoo Park In the 7th Innovations in Theoretical Computer Science Conference (ITCS 2016). - Adaptively Secure Coin-Flipping, Revisited [pdf] [ePrint] [arXiv]
Shafi Goldwasser, Yael Tauman Kalai, and Sunoo Park In the 42nd Int'l Colloquium on Automata, Languages, and Programming (ICALP 2015). - Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit [pdf] [arXiv]
Pavel Hubáček and Sunoo Park In the 15th ACM Conference on Economics and Computation (EC 2014).
NB: In computer science, conferences and symposia are peer reviewed,
and they are the primary publication outlets.
In law, journals and law reviews are the primary publication outlets.
Authors are listed alphabetically by last name, except where indicated by an
asterisk.
I have served on the Program Committees of:
- IEEE Security and Privacy (“Oakland”) 2022 & 2023
- IEEE Security and Privacy (“Oakland”) 2022 & 2023
— Research Ethics Committee
- Neural Information Processing Systems (NeurIPS) 2022 & 2023
— Research Ethics Committee
- ACM Symposium on Computer Science & Law (CSLAW) 2022 & 2024
- ACM Conference on Fairness, Accountability, and Transparency (FAccT) 2021
- Journal of Cryptoeconomic Systems 2020
- IACR Theory of Cryptography Conference (TCC) 2020
I also co-organized a Workshop on Encryption, Surveillance, and
Transparency at Johns
Hopkins University in August 2018, in collaboration with Matthew D. Green and
Michael A. Specter.
sunoo·park at nyu·edu
(PGP key / fingerprint)
60 Fifth Avenue, Room 316,
New York, NY 10011,
USA
|