Yan Huang

Assistant Professor of Computer Science

Indiana University, Bloomington


I am broadly interested in security and cryptography. I have worked on developing cryptographic protocols that provide strong security guarantees over generic computation. My goal is to build elegant theoretical ideas into practically usable systems that address real-world security problems. This often requires synergy of Theory, Program Analysis, Artificial Intelligence, and Software Engineering. My research is funded by NSF.

I am seeking self-motivated research students.


  • Summer School on Secure and Oblivious Computation and Outsourcing. (Notre Dame, May 2016)

      Secure Computation Basics [slides]

      Secure Computation Pragmatics [ slides ]

  • Selected Publications

    • [USENIX'16] The Cut-and-Choose Game and its Application to Cryptographic Protocols.
      With Ruiyu Zhu, abhi shelat, Jonathan Katz. [pdf, 16 pages, code]

    • [CCS'15] Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
      With Xiao Wang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, Diyue Bu. [pdf, 12 pages, code]

    • [CCS'15] Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward.
      With Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang. [pdf, 13 pages, code]

    • [SP'15] ObliVM: A Programming Framework for Secure Computation.
      With Xiao Wang, Chang Liu, Kartik Nayak, Elaine Shi. [pdf, 12 pages, code]
      This version differs substantially from and should subsume the IEEE proceeding version.

    • [CCS'14] SCORAM: Oblivious RAM for Secure Computation.
      With Xiao Wang, T-H. Hubert Chan, Abhi Shelat, Elaine Shi. [pdf, 12 pages, code]

    • [CCS'14] Oblivious Data Structures .
      With Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov. [pdf, 12 pages]

    • [CRYPTO'14] Amortizing Garbled Circuits.
      Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff. [pdf, 18 pages]

    • [SP'14] Automating Efficient RAM-Model Secure Computation.
      Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks. [pdf, 16 pages]

    • [CRYPTO'13] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
      Yan Huang, Jonathan Katz, David Evans. [pdf, 16 pages]

    • [SP'12] Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Symmetric Execution.
      Yan Huang, Jonathan Katz, David Evans. [pdf, 13 pages]

    • [NDSS'12] Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
      Yan Huang, David Evans, Jonathan Katz [pdf, 15 pages]

    • [USENIX Security'11] Faster Secure Two-Party Computation Using Garbled Circuits.
      Yan Huang, David Evans, Jonathan Katz, Lior Malka. [pdf, 16 pages]

    • [NDSS'11] Efficient Privacy-Preserving Biometric Identification.
      Yan Huang, Lior Malka, David Evans, and Jonathan Katz. [pdf, 14 pages]

    • [HotSec'11] Privacy-Preserving Applications on Smartphones.
      Yan Huang, Peter Chapman, and David Evans. [pdf, 6 pages]

    • Full list of papers on Google Scholar

      Source code of previous projects

    Current Students

    Ph.D Students

    Undergraduate Students

    • Joshua Cannon, McNair Scholar, (Informatics, Class of 2017) private authentication

    • Mark Shepherd, (Computer Science, Class of 2017), functional approach to cryptography

    • Katherine Spoon, (Informatics, Class of 2019), secure bioinformatics

    • Mary A. Smart, SWSIS Scholar, (Computer Science, Class of 2017), privacy-preserving applications


  • Anna McJohn (BA Informatics, 2016)

  • Carl Factora (BA Computer Science, 2016)

  • Teaching

    Professional Services

    Program Committees (Consider submitting your excellent work!)

    Conference Referee

    • IEEE Security & Privacy (2011, 2012, 2013), USENIX Security (2011, 2012, 2014), ACM CCS (2011, 2013), NDSS (2011, 2012, 2013, 2015)
    • IACR CRYPTO (2013, 2014, 2015, 2016), IACR EUROCRYPT (2015)
    • AsiaCrypt(2013, 2014), CANS (2012)

    Journal Reviewer

    • ACM Transactions on Information and System Security (TISSEC)
    • Journal of Computer and System Sciences
    • Journal of Computer Security (JCS)
    • IEEE Transactions on Dependable and Secure Computing (TDSC)
    • IEEE Transactions on Parallel and Distributed Systems (TPDS)
    • ACM Transactions on Internet Technology (ToIT)