Sunoo Park ▪  Postdoctoral Fellow, Columbia Univ. & Columbia Law School ▪  J.D. (Harvard Law School) ▪  Ph.D., Computer Science (MIT)
Background.

I do academic research in computer science (security and cryptography) and in technology law and policy. I am a postdoctoral fellow at Columbia University and visiting fellow at Columbia Law School, hosted by Steven Bellovin and Daniel Richman.

I received my J.D. at Harvard Law School, my Ph.D. in computer science at MIT (advised by Shafi Goldwasser), and my B.A. in computer science at the University of Cambridge. During my Ph.D. studies, I was in the Cryptography and Information Security and Theory of Computation groups at MIT, and also affiliated with MIT’s Internet Policy Research Initiative and with the Digital Currency Initiative (DCI) at the MIT Media Lab. Between 2017–20, I was a Fellow and then an Affiliate at the Berkman-Klein Center for Internet & Society at Harvard University. Between 2018–20, I also did postdoctoral research at the MIT Media Lab’s Digital Currency Initiative. After law school, I spent the 2021–22 academic year as a postdoctoral fellow at Cornell Tech’s Digital Life Initiative, hosted by James Grimmelmann and Helen Nissenbaum, supported by a 2021 Computing Innovation Fellowship.

I am currently looking for faculty positions to start in Fall 2023.

Guide to Security Research Legal Risks.
30 Oct 2020: I’m excited to announce A Researcher's Guide to Some Legal Risks of Security Research, authored by me and Kendra Albert, jointly published by the Cyberlaw Clinic at Harvard Law School and the Electronic Frontier Foundation (EFF)! See our Cyberlaw Clinic blog post here.
Law Review Publications.
  1. The Right to Vote Securely
    Sunoo Park
    To appear in the University of Colorado Law Review, Spring 2023.
  2. Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries [SSRN]
    Aloni Cohen and Sunoo Park
    In the Harvard Journal of Law and Technology (JOLT), Fall 2018 issue.
Computer Science Publications.
  1. A Systematization of Voter Registration System Security [ePrint]
    Jack Cable, Andrés Fábrega, Sunoo Park, and Michael Specter
    To appear in the Journal of Cybersecurity (2023).
  2. The Superlinearity Problem in Post-Quantum Blockchains [ePrint]
    Sunoo Park and Nicholas Spooner
    To appear in the 27th International Conference on Financial Cryptography and Data Security (Financial Crypto 2023).
  3. Cryptography, Trust, and Privacy: It's Complicated
    Ero Balsa, Helen Nissenbaum, and Sunoo Park
    In the 2nd ACM Symposium on Computer Science and Law (CSLAW 2022).
  4. KeyForge: Non-Attributable Email from Forward-Forgeable Signatures [ePrint]
    *Michael Specter, Sunoo Park, and Matthew Green
    In the 30th USENIX Security Symposium (USENIX Security 2021).
  5. Going from Bad to Worse: from Internet Voting to Blockchain Voting [link]
    *Sunoo Park, Michael Specter, Neha Narula, and Ronald L. Rivest
    In the Journal of Cybersecurity (2021).
  6. Fully Deniable Interactive Encryption [ePrint]
    Ran Canetti, Sunoo Park, and Oxana Poburinnaya
    In the 40th Annual International Cryptology Conference (CRYPTO 2020).
  7. Data Structures Meet Cryptography: 3SUM with Preprocessing [arXiv]
    Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, and Vinod Vaikuntanathan
    In the 52nd ACM Symposium on the Theory of Computing (STOC 2020).
  8. It Wasn't Me! Repudiability and Unclaimability of Ring Signatures [ePrint]
    Sunoo Park and Adam Sealfon
    In the 39th Annual International Cryptology Conference (CRYPTO 2019).
  9. How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt [ePrint]
    Thibaut Horel, Sunoo Park, Silas Richelson, and Vinod Vaikuntanathan
    In the 10th Innovations in Theoretical Computer Science conference (ITCS 2019).
  10. Static-Memory-Hard Functions and Modeling the Cost of Space vs. Time [ePrint]
    Thaddeus Dryja, Quanquan C. Liu, and Sunoo Park
    In the 16th IACR Theory of Cryptography Conference (TCC 2018).
  11. Practical Accountability of Secret Processes [ePrint]
    *Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, and Daniel J. Weitzner
    In the 27th USENIX Security Symposium (USENIX Security 2018).
  12. Proactive Secure Multiparty Computation with a Dishonest Majority
    Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, and Moti Yung
    In the 11th Conference on Security and Cryptography for Networks (SCN 2018).
  13. SpaceMint: A Cryptocurrency Based on Proofs of Space [pdf] [ePrint]
    *Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gaži, Joël Alwen, and Krzysztof Pietrzak
    In the 22nd International Conference on Financial Cryptography and Data Security (Financial Crypto 2018).
  14. Public Accountability vs. Secret Laws: Can They Coexist? [ePrint]
    Shafi Goldwasser and Sunoo Park
    In the 16th Workshop on Privacy in the Electronic Society (WPES) at CCS 2017.
  15. Towards Secure Quadratic Voting [pdf] [ePrint]
    Sunoo Park and Ronald L. Rivest
    In Public Choice 2017.
  16. How to Incentivize Data-Driven Collaboration Among Competing Parties [pdf] [ePrint] [arXiv]
    Pablo Daniel Azar, Shafi Goldwasser, and Sunoo Park
    In the 7th Innovations in Theoretical Computer Science conference (ITCS 2016).
  17. Adaptively Secure Coin-Flipping, Revisited [pdf] [ePrint] [arXiv]
    Shafi Goldwasser, Yael Tauman Kalai, and Sunoo Park
    In the 42nd International Colloquium on Automata, Languages, and Programming (ICALP 2015).
  18. Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit [pdf] [arXiv]
    Pavel Hubáček and Sunoo Park
    In the 15th ACM Conference on Economics and Computation (EC 2014).

NB: In computer science, conferences and symposia are peer reviewed, and they are the primary publication outlets. In law, journals are the primary publication outlets. Authors are listed alphabetically by last name, except where indicated by an asterisk.

Manuscripts.
  1. Scan, Shuffle, Rescan: Two-Prover Election Audits [ePrint]
    Douglas W. Jones, Sunoo Park, Ronald L. Rivest, and Adam Sealfon
Academic Service.
I have served on the Program Committees of:
  • IEEE Security and Privacy (“Oakland”) 2022 & 2023
  • IEEE Security and Privacy (“Oakland”) 2022 & 2023 — Research Ethics Committee
  • Neural Information Processing Systems (NeurIPS) 2022 — Research Ethics Committee
  • ACM Symposium on Computer Science & Law (CSLAW) 2022
  • ACM Conference on Fairness, Accountability, and Transparency (FAccT) 2021
  • Journal of Cryptoeconomic Systems 2020
  • IACR Theory of Cryptography Conference (TCC) 2020
I also co-organized a Workshop on Encryption, Surveillance, and Transparency at Johns Hopkins University in August 2018, in collaboration with Matthew D. Green and Michael A. Specter.
Contact.

sunoo at csail·mit·edu  (PGP key / fingerprint)