David A. Wilson
I am currently a PhD student at MIT working in the Theory Group of the Computer Science and Artificial Intelligence Laboratory. Specifically, I work in the Cryptography and Information Security Group; my advisor is Shafi Goldwasser. Most of my research involves modern theoretical cryptography, in topics such as identity-based encryption and homomorphic encryption.
I received Bachelor's degrees from MIT in computer science and mathematics in 2004 and an M.Eng. in computer science in 2005. I then worked as a software engineer before returning to academia in 2009 to work on a PhD.
If you want to contact me, the best way is email. My username is dwilson, and my university's domain is mit.edu.
Publications and Research
- Stefano Tessaro and David A. Wilson. Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. PKC 2014. PDF BibTeX
- Stefano Tessaro and David A. Wilson. Obfuscating Many-to-one Functional Re-encryption, and its Connection to Fully-Homomorphic Encryption. Manuscript. PDF
- Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, and David A. Wilson. On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption. IMA Cryptography and Coding 2013. PDF BibTeX
- Erik D. Demaine, Pavel Panchekha, David A. Wilson, Edward Z. Yang. Blame Trees. In Proceedings of the 12th International Symposium on Algorithms and Data Structures (WADS 2013). PDF BibTeX
- Shafi Goldwasser, Allison Lewko, and David A. Wilson. Bounded-Collusion IBE from Key Homomorphism. TCC 2012. PDF BibTeX
- Erik D. Demaine, Sarah Eisenstat, Jeffrey Shallit, and David A. Wilson. Remarks on Separating Words. DCFS 2011. PDF BibTeX
- Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson. Optimal Error Correction Against Computationally Bounded Noise. TCC 2005. PDF BibTeX (Conference version)
- Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson. Optimal Error Correction for Computationally Bounded Noise. IEEE Transactions on Information Theory 56:11, 2010. PDF BibTeX (Journal version)
- David A. Wilson. Error-Free Message Transmission in the Universal Composability Framework. Master's thesis (MIT), 2005. PDF
In 2008 I entered the NIST Hash Function Competition. My entry (DCH) fell quickly in the first round. For more information--and my attacks on two other entries--please see my SHA-3 page.
I have worked as a teaching assistant for the following courses:
- 6.857 Network and Computer Security, Spring 2013
- 6.875 Cryptography and Cryptanalysis, Spring 2012
- 6.046 Design and Analysis of Algorithms, Fall 2010
- 6.004 Computation Structures, Spring 2005
- 6.857 Network and Computer Security, Fall 2004
I am a member and former Chair of the Student Information Processing Board at MIT. SIPB is a student group devoted to computers and computing technology, and has been working on computing projects and providing computing-related services since 1969.
I enjoy puzzles, and frequently compete in puzzle competitions such as the MIT Mystery Hunt and the Microsoft College Puzzle Challenge.
In case you're wondering where my hometown is for some reason, when I was growing up my mother worked in an office building colloquially known as "the beer can".