Yan Huang

Assistant Professor of Computer Science

Indiana University, Bloomington

PGP Key

I am broadly interested in security and cryptography. I have worked on developing cryptographic protocols that provide strong security guarantees over generic computation. My goal is to build elegant theoretical ideas into practically usable systems that address real-world security problems. This often requires synergy of Theory, Program Analysis, Artificial Intelligence, and Software Engineering. My research is funded by NSF and NIH.

I am seeking self-motivated research students.

Talks

Selected Publications

  • [ASIACRYPT'17] JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes.
    With Ruiyu Zhu. [pdf, 42 pages, code]

  • [CCS'17] Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries.
    With Ruiyu Zhu, Darion Cassel. [pdf, 13 pages, code]

  • [USENIX'16] The Cut-and-Choose Game and its Application to Cryptographic Protocols.
    With Ruiyu Zhu, abhi shelat, Jonathan Katz. [pdf, 16 pages, code]

  • [CCS'15] Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance.
    With Xiao Wang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, Diyue Bu. [pdf, 12 pages, code]

  • [CCS'15] Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy and the New Way Forward.
    With Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang. [pdf, 13 pages, code]

  • [SP'15] ObliVM: A Programming Framework for Secure Computation.
    With Xiao Wang, Chang Liu, Kartik Nayak, Elaine Shi. [pdf, 12 pages, code]
    This version differs substantially from and should subsume the IEEE proceeding version.

  • [CCS'14] SCORAM: Oblivious RAM for Secure Computation.
    With Xiao Wang, T-H. Hubert Chan, Abhi Shelat, Elaine Shi. [pdf, 12 pages, code]

  • [CCS'14] Oblivious Data Structures .
    With Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov. [pdf, 12 pages]

  • [CRYPTO'14] Amortizing Garbled Circuits.
    Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff. [pdf, 18 pages]

  • [SP'14] Automating Efficient RAM-Model Secure Computation.
    Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael Hicks. [pdf, 16 pages]

  • [CRYPTO'13] Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
    Yan Huang, Jonathan Katz, David Evans. [pdf, 16 pages]

  • [SP'12] Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Symmetric Execution.
    Yan Huang, Jonathan Katz, David Evans. [pdf, 13 pages]

  • [NDSS'12] Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
    Yan Huang, David Evans, Jonathan Katz [pdf, 15 pages]

  • [USENIX Security'11] Faster Secure Two-Party Computation Using Garbled Circuits.
    Yan Huang, David Evans, Jonathan Katz, Lior Malka. [pdf, 16 pages]

  • [NDSS'11] Efficient Privacy-Preserving Biometric Identification.
    Yan Huang, Lior Malka, David Evans, and Jonathan Katz. [pdf, 14 pages]

  • [HotSec'11] Privacy-Preserving Applications on Smartphones.
    Yan Huang, Peter Chapman, and David Evans. [pdf, 6 pages]

  • Full list of papers on Google Scholar

    Source code of previous projects

Preprints

  • Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes.
    With Ruiyu Zhu. [pdf, code]

Current Students

Ph.D Students

Undergraduate Students

  • Joshua Cannon, McNair Scholar, (Informatics, Class of 2017) private authentication

  • Mark Shepherd, (Computer Science, Class of 2017), functional approach to cryptography

  • Katherine Spoon, (Informatics, Class of 2019), secure bioinformatics

  • Mary A. Smart, SWSIS Scholar, (Computer Science, Class of 2017), privacy-preserving applications

Alumni

  • Darion Cassel (BA CS, 2017, Now pursuing Ph.D at CMU)

  • Anna McJohn (BA Informatics, 2016)

  • Carl Factora (BA Computer Science, 2016)

Teaching

Professional Services

Program Committees (Consider submitting your excellent work!)

Conference Referee

  • IEEE Security & Privacy (2011, 2012, 2013), USENIX Security (2011, 2012, 2014), ACM CCS (2011, 2013), NDSS (2011, 2012, 2013, 2015)
  • CRYPTO (2013, 2014, 2015, 2016), EUROCRYPT (2015)
  • AsiaCrypt (2013, 2014), CANS (2012)

Journal Reviewer

  • ACM Transactions on Information and System Security (TISSEC)
  • Journal of Computer and System Sciences
  • Journal of Computer Security (JCS)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Parallel and Distributed Systems (TPDS)
  • ACM Transactions on Internet Technology (ToIT)