I do academic research in technology law
and in computer science (security and cryptography).
I am currently a postdoctoral fellow at Cornell Tech’s
Digital Life Initiative,
James Grimmelmann and
and my research is supported by a 2021 Computing Innovation Fellowship.
Starting in Fall 2022, I will be a postdoctoral fellow at
Columbia University and
visiting fellow at
Columbia Law School,
Steven Bellovin and Daniel Richman.
I received my J.D. at Harvard Law School,
my Ph.D. in computer science at MIT (advised by Shafi Goldwasser), and my B.A. in computer science at the
University of Cambridge.
During my Ph.D. studies, I was in the Cryptography and Information Security
and Theory of Computation groups at MIT,
and also affiliated with MIT’s Internet Policy Research Initiative
and with the Digital Currency Initiative (DCI) at the
MIT Media Lab.
I was a Fellow and then an Affiliate at the Berkman-Klein
Center for Internet & Society at Harvard University.
I also did postdoctoral research at the MIT Media Lab’s Digital Currency
I am currently looking for faculty positions to start in Fall 2023.
Guide to Security Research Legal Risks.
30 Oct 2020: I’m excited to announce A
Researcher's Guide to Some Legal Risks of Security Research, authored by me
and Kendra Albert, jointly published by the Cyberlaw Clinic at Harvard Law
School and the Electronic Frontier Foundation (EFF)!
See our Cyberlaw Clinic blog post here.
Computer Science Publications.
- The Right to Vote Securely
To appear in the University of Colorado Law Review, Spring 2023.
- Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries [SSRN]
Aloni Cohen and Sunoo Park
In the Harvard Journal of Law and Technology (JOLT), Fall 2018 issue.
- Cryptography, Trust, and Privacy: It's Complicated
Ero Balsa, Helen Nissenbaum, and Sunoo Park
To appear in the 2nd ACM Symposium on Computer Science and Law (CSLAW 2022).
- KeyForge: Non-Attributable Email from Forward-Forgeable Signatures [ePrint]
*Michael Specter, Sunoo Park, and Matthew Green
In the 30th USENIX Security Symposium (USENIX Security 2021).
- Going from Bad to Worse: from Internet Voting to Blockchain Voting [link]
*Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Rivest
In the Journal of Cybersecurity (2021).
- Fully Deniable Interactive Encryption [ePrint]
Ran Canetti, Sunoo Park, and Oxana Poburinnaya
In the 40th Annual International Cryptology Conference (CRYPTO 2020).
- Data Structures Meet Cryptography: 3SUM with Preprocessing [arXiv]
Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, and Vinod Vaikuntanathan
In the 52nd ACM Symposium on the Theory of Computing (STOC 2020).
- It Wasn't Me! Repudiability and Unclaimability of Ring Signatures [ePrint]
Sunoo Park and Adam Sealfon
In the 39th Annual International Cryptology Conference (CRYPTO 2019).
- How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt [ePrint]
Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan
In the 10th Innovations in Theoretical Computer Science conference (ITCS 2019).
- Static-Memory-Hard Functions and Modeling the Cost of Space vs. Time [ePrint]
Thaddeus Dryja, Quanquan C. Liu, and Sunoo Park
In the 16th IACR Theory of Cryptography Conference (TCC 2018).
- Practical Accountability of Secret Processes [ePrint]
*Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, and Daniel J. Weitzner
In the 27th USENIX Security Symposium (USENIX Security 2018).
- Proactive Secure Multiparty Computation with a Dishonest Majority
Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, and Moti Yung
In the 11th Conference on Security and Cryptography for Networks (SCN 2018).
- SpaceMint: A Cryptocurrency Based on Proofs of Space [pdf] [ePrint]
*Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, and Krzysztof Pietrzak
In the 22nd International Conference on Financial Cryptography and Data Security (Financial Crypto 2018).
- Public Accountability vs. Secret Laws: Can They Coexist? [ePrint]
Shafi Goldwasser and Sunoo Park
In the 16th Workshop on Privacy in the Electronic Society (WPES) at CCS 2017.
- Towards Secure Quadratic Voting [pdf] [ePrint]
Sunoo Park and Ronald L. Rivest
In Public Choice 2017.
- How to Incentivize Data-Driven Collaboration Among Competing Parties [pdf] [ePrint] [arXiv]
Pablo Daniel Azar, Shafi Goldwasser, and Sunoo Park
In the 7th Innovations in Theoretical Computer Science conference (ITCS 2016).
- Adaptively Secure Coin-Flipping, Revisited [pdf] [ePrint] [arXiv]
Shafi Goldwasser, Yael Tauman Kalai, and Sunoo Park
In the 42nd International Colloquium on Automata, Languages, and Programming (ICALP 2015).
- Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit [pdf] [arXiv]
Pavel Hubáček and Sunoo Park
In the 15th ACM Conference on Economics and Computation (EC 2014).
NB: In computer science, conferences and symposia are peer reviewed,
and they are the primary publication outlets.
In law, journals are the primary publication outlets.
Authors are listed alphabetically by last name, except where indicated by an
sunoo at csail·mit·edu (PGP key / fingerprint)