Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
Blog Post number 4
Published:
Blog Post number 3
Published:
Blog Post number 2
Published:
Blog Post number 1
Published:
portfolio
publications
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
Zhenfeng Zhang, Kang Yang*, Xuexian Hu, and Yuchen Wang. " Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. " The 23rd ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2016, pp. 1179-1191, ACM Press.
Download Paper
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities
Zhenfeng Zhang, Yuchen Wang, and Kang Yang. " Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities. " Network and Distributed Systems Security (NDSS) Symposium 2020.
Download Paper
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, and Kang Yang*. " Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes " The 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2020, Part I, vol. 12111 of LNCS, pp. 37–65, Springer.
Download Paper
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang, Xiao Wang, and Jiang Zhang. " More Efficient MPC from Improved Triple Generation and Authenticated Garbling. " The 27th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2020, pp. 1627-1646, ACM Press.
Download Paper
Ferret: Fast Extension for Correlated OT with Small Communication
Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, and Xiao Wang. " Ferret: Fast Extension for Correlated OT with Small Communication. " The 27th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2020, pp. 1607-1626, ACM Press.
Download Paper
Direct Anonymous Attestation With Optimal TPM Signing Efficiency
Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, and Li Xi. " Direct Anonymous Attestation With Optimal TPM Signing Efficiency. " IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2260-2275, 2021.
Download Paper
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
Chenkai Weng, Kang Yang*, Xiang Xie, Jonathan Katz, and Xiao Wang. " Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. " The 30th USENIX Security Symposium -- USENIX Security 2021, pp. 501-518, USENIX Association.
Download Paper
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
Chenkai Weng, Kang Yang*, Jonathan Katz, and Xiao Wang. " Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits. " The 42nd IEEE Symposium on Security and Privacy -- S&P 2021, pp. 1074-1091, IEEE Computer Society.
Download Paper
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang*, Pratik Sarkar, Chenkai Weng, and Xiao Wang. " QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. " The 28th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2021, pp. 2986-3001, ACM Press.
Download Paper
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
Kang Yang, Pratik Sarkar, Chenkai Weng, and Xiao Wang. " QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field. " The 28th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2021, pp. 2986-3001, ACM Press. ACM CCS Best Paper Award runner up
Download Paper
Concretely efficient secure multi-party computation protocols: survey and more
Dengguo Feng and Kang Yang*. " Concretely efficient secure multi-party computation protocols: survey and more. " Security and Safety, vol. 1, 2021001, 2022. Best Paper Award
Download Paper
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
Zhi Qiu, Kang Yang, Yu Yu, and Lijing Zhou. " Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. " The 24th International Conference on Information and Communications Security -- ICICS 2022, vol. 13407 of LNCS, pp. 69–88, Springer. Best Paper Award
Download Paper
AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
Chenkai Weng, Kang Yang*, Zhaomin Yang, Xiang Xie, and Xiao Wang. " AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication. " The 29th ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2022, pp. 2901-2914, ACM Press.
Download Paper
Non-interactive Zero-Knowledge Proofs to Multiple Verifiers
Kang Yang and Xiao Wang. " Non-interactive Zero-Knowledge Proofs to Multiple Verifiers. " Advances in Cryptology -- ASIACRYPT 2022, Part III, vol. 13793 of LNCS, pp. 517–546, Springer.
Download Paper
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and Its Applications to Blockchain
Qi Feng, Kang Yang*, Mimi Ma, and Debiao He. " Efficient Multi-Party EdDSA Signature With Identifiable Aborts and Its Applications to Blockchain. " IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1937-1950, 2023.
Download Paper
Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks
Hongrui Cui, Xiao Wang, Kang Yang*, and Yu Yu. " Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks. " Advances in Cryptology -- EUROCRYPT 2023, Part II, vol. 14005 of LNCS, pp. 35–67, Springer.
Download Paper
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
Xiaojie Guo, Kang Yang*, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu. " Half-Tree: Halving the Cost of Tree Expansion in COT and DPF. " Advances in Cryptology -- EUROCRYPT 2023, Part I, vol. 14004 of LNCS, pp. 330–362, Springer.
Download Paper
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves
Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu. " Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves. " Preprint.
Download Paper
Efficient secure multi-party computation for proof of custody in Ethereum sharding
Yuxin Tong, Xiang Xie, Kang Yang, Rui Zhang & Rui Xue . " Efficient secure multi-party computation for proof of custody in Ethereum sharding; Designs, Codes and Cryptography, vol. 92, pp. 2055–2083, 2025.
Download Paper
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang*, Yu Yu, and Kaiyi Zhang. " ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head " The 27th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2024, Part I, vol. 14601 of LNCS, pp. 229–258, Springer.
Download Paper
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " The Hardness of LPN over Any Integer Ring and Field for PCG Applications. " Advances in Cryptology -- EUROCRYPT 2024, Part VI, vol. 14656 of LNCS, pp. 149–179, Springer.
Download Paper
AES-based Multi-instance TCCR Hash with High Security, and Applications
Hongrui Cui,Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu. " AES-based Multi-instance TCCR Hash with High Security, and Applications. " Preprint.
Download Paper
Lightweight Authentication of Web Data via Garble-Then-Prove
Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu. " Lightweight Authentication of Web Data via Garble-Then-Prove. " The 33rd USENIX Security Symposium -- USENIX Security 2024, pp. 1957-1974, USENIX Association.
Download Paper
Scalable Mixed-Mode MPC
Radhika Garg, Kang Yang*, Jonathan Katz, and Xiao Wang. " Scalable Mixed-Mode MPC. " The 45th IEEE Symposium on Security and Privacy -- S&P 2024, pp. 523-541, IEEE Computer Society.
Download Paper
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
Wenhao Zhang, Xiaojie Guo, Kang Yang*, Ruiyu Zhu, Yu Yu, and Xiao Wang. " Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. " The 45th IEEE Symposium on Security and Privacy -- S&P 2024, pp. 561-577, IEEE Computer Society.
Download Paper
Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication
Zhenkai Hu, Kang Yang*, and Yu Yu. " Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication " The 37th IEEE Computer Security Foundations Symposium -- CSF 2024, pp. 557-572.
Download Paper
An Efficient ZK Compiler from SIMD Circuits to General Circuits
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang*, and Yu Yu. " An Efficient ZK Compiler from SIMD Circuits to General Circuits. " Journal of Cryptology, vol. 38, no. 10, 2024.
Download Paper
Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference
Jiaxing He, Kang Yang*, Guofeng Tang, Zhangjie Huang, Li Lin, Changzheng Wei, Ying Yan, and Wei Wang. " Rhombus: Fast Homomorphic Matrix-Vector Multiplication for Secure Two-Party Inference. " The 31st ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2024, pp. 2490-2504, ACM Press.
Download Paper
Nimbus: Secure and Efficient Two-Party Inference for Transformers
Zhengyi Li, Kang Yang*, Jin Tan, Wenjie Lu, Haoqi Wu, Xiao Wang, Yu Yu, Derun Zhao, Yancheng Zheng, Minyi Guo, and Jingwen Leng. " Nimbus: Secure and Efficient Two-Party Inference for Transformers. " The 38th Conference on Neural Information Processing Systems -- NeurIPS 2024, no. 680, pp. 21572-21600.
Download Paper
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
Hongrui Cui, Xiao Wang, Kang Yang*, and Yu Yu. " Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. " Journal of Cryptology, vol. 38, no. 19, 2025.
Download Paper
Labeled Private Set Intersection From Distributed Point Function
Qi Liu, Xiaojie Guo, Kang Yang, and Yu Yu. " Labeled Private Set Intersection From Distributed Point Function. " IEEE Transactions on Information Forensics and Security, vol. 20, pp. 2970-2983, 2025.
Download Paper
BitGC: Garbled Circuits with 1 Bit per Gate
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " BitGC: Garbled Circuits with 1 Bit per Gate. " Advances in Cryptology -- EUROCRYPT 2025, Part VII, vol. 15607 of LNCS, pp. 437–466, Springer.
Download Paper
Stateless Deterministic Multi-party EdDSA Signatures with Low Communication
Qi Feng, Kang Yang*, Kaiyi Zhang, Xiao Wang, Yu Yu, and Xiang Xie. " Stateless Deterministic Multi-party EdDSA Signatures with Low Communication. " The 28th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2025, Part V, vol. 15678 of LNCS, pp. 268–297, Springer.
Download Paper
On tweakable correlation robust hashing against key leakages
Chun Guo, Xiao Wang, Kang Yang*, and Yu Yu. " On tweakable correlation robust hashing against key leakages. " Designs, Codes and Cryptography, vol. 93, pp. 3375–3412, 2025.
Download Paper
An Efficient Private GPT Never Autoregressively Decodes
Zhengyi Li, Yue Guan, Kang Yang*, Yu Feng, Ning Liu, Yu Yu, Jingwen Leng, and Minyi Guo. " An Efficient Private GPT Never Autoregressively Decodes. " The 42nd International Conference on Machine Learning -- ICML 2025, no. 1349, pp. 34410-34428.
Download Paper
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers
Yuncong Hu, Pratyush Mishra, Xiao Wang, Jie Xie, Kang Yang*, Yu Yu, and Yuwen Zhang. " DFS: Delegation-friendly zkSNARK and Private Delegation of Provers. " The 34th USENIX Security Symposium -- USENIX Security 2025, pp. 2065-2084, USENIX Association.
Download Paper
AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, Longhui Yin, and Yu Yu. " AGB 2.0: Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications. " Preprint.
Download Paper
Authenticated BitGC for Actively Secure Rate-One 2PC
Hanlin Liu, Xiao Wang, Kang Yang*, and Yu Yu. " Authenticated BitGC for Actively Secure Rate-One 2PC. " Advances in Cryptology -- CRYPTO 2025, Part IV, vol. 16003 of LNCS, pp. 652–687, Springer.
Download Paper
Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC
Jiangxia Ge, Kang Yang, Yang Yu, and Yu Yu. " Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC. " Preprint.
Download Paper
Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC
Hongrui Cui, Chun Guo, Xiaojie Guo, Xiao Wang, Kang Yang, and Yu Yu. " Simulation-based Security Notion of Correlation Robust Hashing with Applications to MPC. " Preprint.
Download Paper
Ironman: Accelerating Oblivious Transfer Extension for Privacy-Preserving AI with Near-Memory Processing
Chenqi Lin, Kang Yang, Tianshi Xu, Ling Liang, Yufei Wang, Zhaohui Chen, Runsheng Wang, Mingyu Gao, and Meng Li. " Ironman: Accelerating Oblivious Transfer Extension for Privacy-Preserving AI with Near-Memory Processing. " The 58th IEEE/ACM International Symposium on Microarchitecture -- MICRO 2025, pp. 354-368, ACM Press.
Download Paper
Committed Vector Oblivious Linear Evaluation and Its Applications
Yunqing Sun, Hanlin Liu, Kang Yang*, Yu Yu, Xiao Wang, and Chenkai Weng. " Committed Vector Oblivious Linear Evaluation and Its Applications. " The 32nd ACM SIGSAC Conference on Computer and Communications Security -- ACM CCS 2025, pp. 3635-3648, ACM Press.
Download Paper
A Hybrid Algorithm for the Regular Syndrome Decoding Problem
Tianrui Wang, Anyu Wang, Kang Yang*, Hanlin Liu, Yu Yu, Jun Zhang, and Xiaoyun Wang. " A Hybrid Algorithm for the Regular Syndrome Decoding Problem. " Advances in Cryptology -- ASIACRYPT 2025, Part IV, vol. 16248 of LNCS, pp. 466–497, Springer.
Download Paper
M&M: Secure Two-Party Machine Learning Through Modulus Conversion and Mixed-Mode Protocols
Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, and Jian Liu. " M&M: Secure Two-Party Machine Learning Through Modulus Conversion and Mixed-Mode Protocols. " IEEE Transactions on Dependable and Secure Computing, vol. 23, no. 2, pp. 4121-4135, 2025.
Download Paper
Dory: Streaming PCG with Small Memory
Xiaojie Guo, Hanlin Liu, Zhicong Huang, Hongrui Cui, Wenhao Zhang, Cheng Hong, Xiao Wang, Kang Yang*, and Yu Yu. " Dory: Streaming PCG with Small Memory. " The 47th IEEE Symposium on Security and Privacy -- S&P 2026, pp. 1466-1484, IEEE Computer Society.
Download Paper
Concretely Efficient Fluid MPC with Linear Communication
Yubo Zeng, Kang Yang*, Dengguo Feng, and Min Zhang. " Concretely Efficient Fluid MPC with Linear Communication. " To appear at The 29th IACR International Conference on Practice and Theory of Public-Key Cryptography -- PKC 2026.
Download Paper
BitGC Made (More) Efficient
Wenhao Zhang, Hanlin Liu, Kang Yang*, Wen-jie Lu, Yu Yu, Xiao Wang, and Chenkai Weng. " BitGC Made (More) Efficient. " To appear in Advances in Cryptology -- EUROCRYPT 2026.
Download Paper
HERDS: Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping
Binwu Xiang, Seonhong Min, Intak Hwang, Zhiwei Wang, Haoqi He, Yuanju Wei, Kang Yang*, Jiang Zhang, Yi Deng, and Yu Yu. " HERDS: Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping. " To appear in Advances in Cryptology -- EUROCRYPT 2026.
Download Paper
Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding
Zhenkai Hu, Haofei Liang, Xiao Wang, Xiang Xie, Kang Yang*, Yu Yu, and Wenhao Zhang. " Ajax: Fast Threshold Fully Homomorphic Encryption without Noise Flooding." To appear in the 35th USENIX Security Symposium -- USENIX Security 2026.
Download Paper
talks
Talk 1 on Relevant Topic in Your Field
Published:
Tutorial 1 on Relevant Topic in Your Field
Published:
Talk 2 on Relevant Topic in Your Field
Published:
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
Teaching experience 2
Workshop, University 1, Department, 2015
