Skip to main content

Fan Zhang

Adjunct Assistant Professor of Computer Science
Computer Science
Box 90129, Durham, NC 27708
D327 LSRC, Durham, NC 27708

Selected Publications


CrudiTEE: A Stick-And-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs

Conference Leibniz International Proceedings in Informatics, LIPIcs · September 1, 2024 Cryptocurrency introduces usability challenges by requiring users to manage signing keys. Popular signing key management services (e.g., custodial wallets), however, either introduce a trusted party or burden users with managing signing key shares, posing ... Full text Cite

monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters

Journal Article IEEE Transactions on Dependable and Secure Computing · January 1, 2024 Cryptocurrencies such as Bitcoin and Ethereum are gaining popularity thanks to their prominent advantages compared to legacy financial transaction systems. However, they require all participants to reach a consensus on the order of transactions, which fund ... Full text Cite

The Locality of Memory Checking

Conference CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security · November 15, 2023 Motivated by the extended deployment of authenticated data structures (e.g., Merkle Patricia Tries) for verifying massive amounts of data in blockchain systems, we begin a systematic study of the I/O efficiency of such systems. We first explore the fundame ... Full text Cite

DeFi'23: Workshop on Decentralized Finance and Security

Conference CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security · November 15, 2023 Decentralized Finance (DeFi) heralds a transformative moment in the realm of finance, challenging traditional intermediaries with a blockchain-centric blueprint. As DeFi burgeons, the intricate dance between its evolution and security emerges as an area of ... Full text Cite

CanDID: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

Conference Proceedings - IEEE Symposium on Security and Privacy · May 1, 2021 We present CanDID, a platform for practical, user-friendly realization of decentralized identity, the idea of empowering end users with management of their own credentials.While decentralized identity promises to give users greater control over their priva ... Full text Cite

DECO: Liberating Web Data Using Decentralized Oracles for TLS

Journal Article CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 · 2020 Full text Open Access Cite

Order-Fairness for Byzantine Consensus

Conference Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III · 2020 Full text Cite

Order-Fairness for Byzantine Consensus

Journal Article IACR Cryptol. ePrint Arch. · 2020 Cite

Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts

Journal Article IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019 · 2019 Full text Cite

Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware

Conference Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 · 2019 Full text Cite

CHURP: Dynamic-Committee Proactive Secret Sharing

Conference Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 · 2019 Full text Cite

Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More

Conference Proceedings of the 1st ACM Conference on Advances in Financial Technologies, AFT 2019, Zurich, Switzerland, October 21-23, 2019 · 2019 Full text Cite

CHURP: Dynamic-Committee Proactive Secret Sharing

Journal Article IACR Cryptol. ePrint Arch. · 2019 Cite

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge

Conference 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017 · 2017 Full text Cite

Solidus: Confidential Distributed Ledger Transactions via PVORM

Conference Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017 · 2017 Full text Cite

REM: Resource-Efficient Mining for Blockchains

Conference 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017 · 2017 Cite

REM: Resource-Efficient Mining for Blockchains

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Solidus: Confidential Distributed Ledger Transactions via PVORM

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware

Journal Article IACR Cryptol. ePrint Arch. · 2017 Cite

Stealing Machine Learning Models via Prediction APIs

Conference 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016 · 2016 Cite

Town Crier: An Authenticated Data Feed for Smart Contracts

Conference Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 · 2016 Full text Cite

Town Crier: An Authenticated Data Feed for Smart Contracts

Journal Article IACR Cryptol. ePrint Arch. · 2016 Cite

PlateClick: Bootstrapping Food Preferences Through an Adaptive Visual Interface

Conference Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, VIC, Australia, October 19 - 23, 2015 · 2015 Full text Cite