Publications

Manuscripts

  1. Edrax: A Cryptocurrency with Stateless Transaction Validation
    Alexander Chepurnoy, Charalampos Papamanthou and Yupeng Zhang

  2. A Zero-Knowledge Version of vSQL
    Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos and Charalampos Papamanthou

Conferences and Workshops

  1. Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof
    Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang and Dawn Song
    IEEE Symposium on Security and Privacy (S&P) , 2020.

  2. CHURP: Dynamic-Committee Proactive Secret Sharing
    Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels and Dawn Song
    ACM Conference on Computer and Communications Security (CCS) , 2019

  3. Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
    Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou and Dawn Song
    Crypto, 2019.

  4. vRAM: Faster Verifiable RAM With Program-Independent Preprocessing
    Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos and Charalampos Papamanthou
    IEEE Symposium on Security and Privacy (S&P),2018.

  5. vSQL: Verifying General SQL Queries over Dynamic Outsourced Databases
    Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos and Charalampos Papamanthou
    IEEE Symposium on Security and Privacy (S&P) , 2017.

  6. SecureML: A System for Scalable Privacy-Preserving Machine Learning
    Payman Mohassel and Yupeng Zhang
    IEEE Symposium on Security and Privacy (S&P), 2017.

  7. An Expressive (Zero-Knowledge) Set Accumulator
    Yupeng Zhang, Jonathan Katz and Charalampos Papamanthou
    IEEE European Symposium on Security and Privacy (Euro S&P) , 2017.

  8. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption
    Yupeng Zhang, Jonathan Katz and Charalampos Papamanthou
    USENIX Security Symposium (USENIX Security) , 2016.

  9. Efficient Authenticated Multi-Pattern Matching
    Zhe Zhou, Tao Zhang, Sherman SM Chow, Yupeng Zhang and Kehuan Zhang
    ACM Aisa Conference on Computer and Communications Security (AsiaCCS) , 2016.

  10. IntegriDB: Verifiable SQL for Outsourced Databases
    Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
    ACM Conference on Computer and Communications Security (CCS) , 2015. (Webpage slides)

  11. ALITHEIA: Towards Practical Verifiable Graph Processing
    Yupeng Zhang, Charalampos Papamanthou and Jonathan Katz
    ACM Conference on Computer and Communications Security (CCS) , 2014. (slides)

  12. Streaming Authenticated Data Structures: Abstraction and Implementation
    Yi Qian, Yupeng Zhang, Xi Chen and Charalampos Papamanthou
    ACM Cloud Computing Security Workshop (CCSW) , 2014.

  13. Distributed Load Balancing in a Multiple Server System by Shift-Invariant Protocol Sequences
    Yupeng Zhang and Wing Shing Wong
    Wireless Communications and Networking Conference (WCNC), 2013.

  14. Failure of TCP Congestion Control under Diversity Routing
    Yupeng Zhang, John Chapin and Vincent W.S. Chan
    Wireless Communications and Networking Conference (WCNC), 2011.

Journal Articles

  1. Verifiable Graph Processing
    Yupeng Zhang, Charalampos Papamanthou and Jonathan Katz
    ACM Transactions on Privacy and Security (TOPS), 2018