CV
I am a professor at State Key Laboratory of Cryptology (SKLC), Beijing, China. My research interests focus on cryptography, particularly in secure multi-party computation (MPC), zero-knowledge proofs, fully homomorphic encryption (FHE), post-quantum cryptography (PQC), and threshold cryptography. I am also interesting in the applications of these cryptographic techniques, such as privacy-preserving machine learning (PPML), secure database, and blockchain.
Education
Institute of Software, Chinese Academy of Sciences, 2017
Ph.D. in Computer Application Technology
Adviser: Zhenfeng Zhang
University of Electronic Science and Technology of China, 2011
B.S. in Information and Computing Science
Work experience
State Key Laboratory of Cryptology, Beijing, China
2021 - 2025
Associated Professor
State Key Laboratory of Cryptology, Beijing, China
2017 - 2021
Assistent Professor
State Key Laboratory of Cryptology, Beijing, China
Publications
Zhenkai Hu, Haofei Liang, Xiao Wang, Xiang Xie, Kang Yang*, Yu Yu, and Wenhao Zhang. " Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding." To appear in the 35th USENIX Security Symposium -- USENIX Security 2026.
Binwu Xiang, Seonhong Min, Intak Hwang, Zhiwei Wang, Haoqi He, Yuanju Wei, Kang Yang*, Jiang Zhang, Yi Deng, and Yu Yu. " HERDS: Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping. " To appear in Advances in Cryptology -- EUROCRYPT 2026.
Wenhao Zhang, Hanlin Liu, Kang Yang*, Wen-jie Lu, Yu Yu, Xiao Wang, and Chenkai Weng. " BitGC Made (More) Efficient. " To appear in Advances in Cryptology -- EUROCRYPT 2026.
Yubo Zeng, Kang Yang*, Dengguo Feng, and Min Zhang. " Concretely Efficient Fluid MPC with Linear Communication. " To appear at The 29th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2026.
Xiaojie Guo, Hanlin Liu, Zhicong Huang, Hongrui Cui, Wenhao Zhang, Cheng Hong, Xiao Wang, Kang Yang*, and Yu Yu. " Dory: Streaming PCG with Small Memory. " The 47th IEEE Symposium on Security and Privacy -- S&P 2026, pp. 1466-1484, IEEE Computer Society.
Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, and Jian Liu. " M&M: Secure Two-Party Machine Learning Through Modulus Conversion and Mixed-Mode Protocols. " IEEE Transactions on Dependable and Secure Computing, vol. 23, no. 2, pp. 4121-4135, 2025.
Tianrui Wang, Anyu Wang, Kang Yang*, Hanlin Liu, Yu Yu, Jun Zhang, and Xiaoyun Wang. " A Hybrid Algorithm for the Regular Syndrome Decoding Problem. " Advances in Cryptology -- ASIACRYPT 2025, Part IV, vol. 16248 of LNCS, pp. 466–497, Springer.
Yunqing Sun, Hanlin Liu, Kang Yang*, Yu Yu, Xiao Wang, and Chenkai Weng. " Committed Vector Oblivious Linear Evaluation and Its Applications. " The 32nd ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2025, pp. 3635-3648, ACM Press.
Chenqi Lin, Kang Yang, Tianshi Xu, Ling Liang, Yufei Wang, Zhaohui Chen, Runsheng Wang, Mingyu Gao, and Meng Li. " Ironman: Accelerating Oblivious Transfer Extension for Privacy-Preserving AI with Near-Memory Processing. " The 58th IEEE/ACM International Symposium on Microarchitecture -- MICRO 2025, pp. 354-368, ACM Press.
Hongrui Cui, Chun Guo, Xiaojie Guo, Xiao Wang, Kang Yang, and Yu Yu. " Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC. " Preprint.
Jiangxia Ge, Kang Yang, Yang Yu, and Yu Yu. " Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC. " Preprint.
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " Authenticated BitGC for Actively Secure Rate-One 2PC. " Advances in Cryptology -- CRYPTO 2025, Part IV, vol. 16003 of LNCS, pp. 652–687, Springer.
Hanlin Liu, Xiao Wang, Kang Yang, Longhui Yin, and Yu Yu. " AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications. " Preprint.
Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang*, Yu Yu, and Yuwen Zhang. " DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. " The 34th USENIX Security Symposium -- USENIX Security 2025, pp. 2065-2084, USENIX Association.
Zhengyi Li, Yue Guan, Kang Yang*, Yu Feng, Ning Liu, Yu Yu, Jingwen Leng, and Minyi Guo. " An Efficient Private GPT Never Autoregressively Decodes. " The 42nd International Conference on Machine Learning -- ICML 2025, no. 1349, pp. 34410-34428.
Chun Guo, Xiao Wang, Kang Yang*, and Yu Yu. " On tweakable correlation robust hashing against key leakages. " Designs, Codes and Cryptography, vol. 93, pp. 3375–3412, 2025.
Qi Feng, Kang Yang*, Kaiyi Zhang, Xiao Wang, Yu Yu, and Xiang Xie. " Stateless Deterministic Multi-party EdDSA Signatures with Low Communication. " The 28th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2025, Part V, vol. 15678 of LNCS, pp. 268–297, Springer.
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " BitGC: Garbled Circuits with 1 Bit per Gate. " Advances in Cryptology -- EUROCRYPT 2025, Part VII, vol. 15607 of LNCS, pp. 437–466, Springer.
Qi Liu, Xiaojie Guo, Kang Yang, and Yu Yu. " Labeled Private Set Intersection From Distributed Point Function. " IEEE Transactions on Information Forensics and Security, vol. 20, pp. 2970-2983, 2025.
Hongrui Cui, Xiao Wang, Kang Yang*, and Yu Yu. " Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. " Journal of Cryptology, vol. 38, no. 19, 2025.
Zhengyi Li, Kang Yang*, Jin Tan, Wenjie Lu, Haoqi Wu, Xiao Wang, Yu Yu, Derun Zhao, Yancheng Zheng, Minyi Guo, and Jingwen Leng. " Nimbus: Secure and Efficient Two-Party Inference for Transformers. " The 38th Conference on Neural Information Processing Systems -- NeurIPS 2024, no. 680, pp. 21572-21600.
Jiaxing He, Kang Yang*, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, and Wei Wang. " Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference. " The 31st ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2024, pp. 2490-2504, ACM Press.
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang*, and Yu Yu. " An Efficient ZK Compiler from SIMD Circuits to General Circuits. " Journal of Cryptology, vol. 38, no. 10, 2024.
Zhenkai Hu, Kang Yang*, and Yu Yu. " Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication " The 37th IEEE Computer Security Foundations Symposium -- CSF 2024, pp. 557-572.
Wenhao Zhang, Xiaojie Guo, Kang Yang*, Ruiyu Zhu, Yu Yu, and Xiao Wang. " Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. " The 45th IEEE Symposium on Security and Privacy -- S&P 2024, pp. 561-577, IEEE Computer Society.
Radhika Garg, Kang Yang*, Jonathan Katz, and Xiao Wang. " Scalable Mixed-Mode MPC. " The 45th IEEE Symposium on Security and Privacy -- S&P 2024, pp. 523-541, IEEE Computer Society.
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu. " Lightweight Authentication of Web Data via Garble-Then-Prove. " The 33rd USENIX Security Symposium -- USENIX Security 2024, pp. 1957-1974, USENIX Association.
Hongrui Cui,Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu. " AES-based Multi-instance TCCR Hash with High Security, and Applications. " Preprint.
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " The Hardness of LPN over Any Integer Ring and Field for PCG Applications. " Advances in Cryptology -- EUROCRYPT 2024, Part VI, vol. 14656 of LNCS, pp. 149–179, Springer.
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang*, Yu Yu, and Kaiyi Zhang. " ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head " The 27th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2024, Part I, vol. 14601 of LNCS, pp. 229–258, Springer.
Yuxin Tong, Xiang Xie, Kang Yang, Rui Zhang & Rui Xue . " Efficient secure multi-party computation for proof of custody in Ethereum sharding; Designs, Codes and Cryptography, vol. 92, pp. 2055–2083, 2025.
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu. " Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves. " Preprint.
Xiaojie Guo, Kang Yang*, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu. " Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. " Advances in Cryptology -- EUROCRYPT 2023, Part I, vol. 14004 of LNCS, pp. 330–362, Springer.
Hongrui Cui, Xiao Wang, Kang Yang*, and Yu Yu. " Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks. " Advances in Cryptology -- EUROCRYPT 2023, Part II, vol. 14005 of LNCS, pp. 35–67, Springer.
Qi Feng, Kang Yang*, Mimi Ma, and Debiao He. " Efficient Multi-Party EdDSA Signature With Identifiable Aborts and Its Applications to Blockchain. " IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1937-1950, 2023.
Kang Yang and Xiao Wang. " Non-interactive Zero-Knowledge Proofs to Multiple Verifiers. " Advances in Cryptology -- ASIACRYPT 2022, Part III, vol. 13793 of LNCS, pp. 517–546, Springer.
Chenkai Weng, Kang Yang*, Zhaomin Yang, Xiang Xie, and Xiao Wang. " AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. " The 29th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2022, pp. 2901-2914, ACM Press.
Zhi Qiu, Kang Yang, Yu Yu, and Lijing Zhou. " Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. " The 24th International Conference on Information and Communications Security -- ICICS 2022, vol. 13407 of LNCS, pp. 69–88, Springer. Best Paper Award
Dengguo Feng and Kang Yang*. " Concretely efficient secure multi-party computation protocols: survey and more. " Security and Safety, vol. 1, 2021001, 2022. Best Paper Award
Kang Yang, Pratik Sarkar, Chenkai Weng, and Xiao Wang. " QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. " The 28th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2021, pp. 2986-3001, ACM Press. ACM CCS Best Paper Award runner up
Kang Yang*, Pratik Sarkar, Chenkai Weng, and Xiao Wang. " QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. " The 28th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2021, pp. 2986-3001, ACM Press.
Chenkai Weng, Kang Yang*, Jonathan Katz, and Xiao Wang. " Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. " The 42nd IEEE Symposium on Security and Privacy -- S&P 2021, pp. 1074-1091, IEEE Computer Society.
Chenkai Weng, Kang Yang*, Xiang Xie, Jonathan Katz, and Xiao Wang. " Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. " The 30th USENIX Security Symposium -- USENIX Security 2021, pp. 501-518, USENIX Association.
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, and Li Xi. " Direct Anonymous Attestation With Optimal TPM Signing Efficiency. " IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2260-2275, 2021.
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, and Xiao Wang. " Ferret: Fast Extension for Correlated OT with Small Communication. " The 27th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2020, pp. 1607-1626, ACM Press.
Kang Yang, Xiao Wang, and Jiang Zhang. " More Efficient MPC from Improved Triple Generation and Authenticated Garbling. " The 27th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2020, pp. 1627-1646, ACM Press.
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, and Kang Yang*. " Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes " The 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2020, Part I, vol. 12111 of LNCS, pp. 37–65, Springer.
Zhenfeng Zhang, Yuchen Wang, and Kang Yang. " Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities. " Network and Distributed Systems Security (NDSS) Symposium 2020.
Zhenfeng Zhang, Kang Yang*, Xuexian Hu, and Yuchen Wang. " Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. " The 23rd ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2016, pp. 1179-1191, ACM Press.