Haibin Zhang
I am the Director / Head of the Department of Information Technology at Yangtze Delta Region Institute of Tsinghua University, Zhejiang.
Or: ucdhbzhang at gmail.com
Short Bio
I am interested in the intersection of distributed systems, applied cryptography, and security.
Previously, I worked as a professor and Teli Youth Fellow at Beijing Institute of Technology, a Chief Research Scientist at Shandong Institute of Blockchain, an Assistant Professor in the Department of Computer Science and Electrical Engineering at University of Maryland, Baltimore County (USA), and a postdoctoral researcher for two NSF frontier projects on cloud security: the MACS project at UConn (with Prof. Marten van Dijk) and the Project Silver at UNC Chapel Hill (with Prof. Michael K. Reiter). I received my Ph.D. from the University of California, Davis (with Prof. Matthew K. Franklin).
I received the best paper candidate award at the 33rd IEEE International Symposium on Reliable Distributed Systems and proved the security of a NIST standard on ciphertext stealing. I received Maryland Innovation Award and research funding from NSF China, the Ministry of Science and Technology China, US NSF, US DoE, US DHS, Norway research council, etc.
I am one of the main inventors of many industry and production large-scale distributed systems such as:
-
Norton Zone: Symantec’s scalable cloud storage;
-
BChain: a highly efficient BFT protocol fully implemented within Hyperledger blockchain framework and featured in the Hyperledger whitepaper;
-
Dyno: a fully-fledged production blockchain platform supporting dynamic membership and various privacy-preseving computation tools (MPC, FL, VSS, FHE). Dyno lays the foundation for open consortium blockchains, allowing consortium members to join and leave dynamically;
-
Dashing/Star: a deployed popular blockchain platform used in various real applications.
Some BFT/permissioned blockchain systems built
ByzID (SRDS 2014, Best Paper Candidate, BFT using small trusted components)
BChain (OPODIS 2014, chain-based high-throughput BFT, used in Hyperledger Iroha, featured in Hyperledger white paper. In fact, this is the only BFT protocol that does not rely on PBFT in the Hyperledger framework.)
CBFT (SRDS 2016, BFT with confidentiality; if you want to achieve private smart contracts without using TEEs, you may be interested in the paper)
CP-BFT (DSN 2017, BFT with causal order without using threshold cryptography)
BEAT (CCS 2018, asynchronous BFT made practical; a family of five state-of-the-art asychronous BFT protocols; open-source implementation [Code] See review from Morning Paper)
EPIC (DSN 2020, asynchronous BFT with adaptive security. Prior asynchronous BFT protocols defend against static adversary, while EPIC tolerates adaptive adversary.)
PACE (CCS 2022) and WaterBear (USENIX Security 2023) are two new asynchronous BFT protocols
FIN (CCS 2023) is our latest system solving a long-standing open problem in BFT and MPC, being the first constant time information-theoretic BFT.
Recently, I am interested in building highly efficient partially synchronous BFT protocols, e.g., our DSN 2022 paper—Marlin, our Oakland 2022 Paper—Dyno, and our EuroSys 2024 paper—Dashing and Star.
I am also recently interested in designing and building distributed and cryptographic systems such as ACSS, AVSS, ADKG, and APSS, systems in synchronous settings, and MPC.
Openings!
Our institute has openings for PIs, research scientists, coders, staff, postdocs, PhDs, masters, and interns.
Publication
- Chenglu Jin, Chao Yin, Marten van Dijk, Sisi Duan, Fabio Massacci, Michael K. Reiter, and Haibin Zhang. PG: Byzantine Fault-Tolerant and Privacy-Preserving Sensor Fusion with Guaranteed Output Delivery. ACM CCS 2024.
- Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang. Dashing and Star: Byzantine Fault Tolerance Using Weak Certificates. EuroSys 2024. [eprint]
- Yunxiao Zhou, Shengli Liu, Shuai Han, and Haibin Zhang. Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE. Asiacrypt 2023. [eprint]
- Xiao Sui, Sisi Duan, and Haibin Zhang. BG: A Modular Treatment of Byzantine Consensus. [DOI] [eprint] This is our new paper trying to provide a “unified” theory for BFT replication. IEEE TIFS.
- Haibin Zhang, Sisi Duan, Boxin Zhao, and Liehuang Zhu. WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT. USENIX Security 2023. [eprint]
- Sisi Duan, Xin Wang, and Haibin Zhang. FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time. ACM CCS 2023. [eprint]
- Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu. Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. [eprint]. IEEE IFIP DSN 2023.
- Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang and Haibin Zhang. Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation. ACM Symposium on Principles of Distributed Computing (PODC), 2022. [PDF][ePrint]
- Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang and Haibin Zhang. Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication. ACM Symposium on Principles of Distributed Computing (PODC), 2022. [PDF]
- Haibin Zhang and Sisi Duan. PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement. ACM CCS 2022. [PDF]
- Xiao Sui, Sisi Duan, and Haibin Zhang. Marlin: Two-Phase BFT with Linearity. DSN 2022. [PDF]
- Sisi Duan and Haibin Zhang. Foundations of Dynamic BFT. IEEE Symposium on Security and Privacy (Oakland) 2022. [DOI] [PDF]
- Haibin Zhang, Chao Liu, and Sisi Duan. How to Achieve Adaptive Security for Asynchronous BFT? Journal of Parallel and Distributed Computing (JPDC), 2022.
- Sisi Duan and Haibin Zhang. Recent Progress on BFT in the era of Blockchains. National Science Review (NSR). (This is an invited, peer-reviewed perspective which is asked to describe our own work on BFT. The maximum number of papers that the perspective can cite is 10. So the perspective can only include a rather limited number of papers and many papers end up with no citations (sorry!). If you are interested in a comprehensive survey, say our paper ACM CUSR below.)
- Xin Wang, Sisi Duan, James R. Clavin, and Haibin Zhang. BFT in Blockchains: From Protocols to Use Cases. ACM Computing Surveys, 2022. [PDF][DOI]
- Guohou Shan, Boxin Zhao, James R. Clavin, Haibin Zhang, and Sisi Duan. Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System. IEEE Transactions on Information Forensics and Security 17: 28-41, 2022. [PDF][DOI]
- Nicolas Alhaddad, Mayank Varia, and Haibin Zhang. High-threshold AVSS with optimal communication complexity. International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2021. [PDF]
- Chao Liu, Sisi Duan, and Haibin Zhang. EPIC: Efficient Asynchronous BFT with Adaptive Security. DSN 2020. [PDF][DOI]
- Sisi Duan, Chao Liu, Xin Wang, Yusen Wu, Shuai Xu, Yelena Yesha, Haibin Zhang. Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging. SRDS 2020: 319-328. [PDF][DOI]
- James R. Clavin, Sisi Duan, Haibin Zhang, Vandana P. Janeja, Karuna P. Joshi, Yelena Yesha, Lucy C. Erickson, and Justin D. Li. Blockchains for Government: Use Cases and Challenges. ACM Digital Government: Resesarch and Practice 1(3): 22:1-22:21, 2020. [PDF][DOI]
- Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang. On the Universally Composable Security of OpenStack. IEEE SecDev 2019. [Full version (125 pages)]
- Alan Sherman, Farid Javani, Haibin Zhang, and Enis Golaszewski. On the Origins and Variations of Blockchain Technologies. IEEE Security & Privacy, 2019. [DOI]
- Sisi Duan, Michael K. Reiter, and Haibin Zhang. BEAT: Asynchronous BFT Made Practical. ACM CCS 2018. [PDF][DOI][Code]
- Siddhant Goenka, Sisi Duan, and Haibin Zhang. A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary. NCA 2018. [PDF][DOI]
- Sisi Duan, Michael K. Reiter, and Haibin Zhang. Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72. [PDF][DOI]
- Sherman S.M. Chow, Haibin Zhang, and Tao Zhang. Real Hidden Identity-Based Signatures. 21st International Conference on Financial Cryptography and Data Security 2017 (FC 2017). [PDF]
- Sisi Duan, Lucas Nicely, and Haibin Zhang. Byzantine Reliable Broadcast in Sparse Networks. NCA 2016: 175-182. [PDF][DOI]
- Walter Bogorad, Scott Schneider, and Haibin Zhang. Norton Zone: Symantec’s Secure Cloud Storage System. IEEE 35th Symposium on Reliable Distributed Systems (SRDS 2016), 2016. [PDF]
- Sisi Duan and Haibin Zhang. Practical State Machine Replication with Confidentiality. SRDS 2016: 187-196. [PDF]
- Mingqiang Wang, Tao Zhan, and Haibin Zhang. Bit Security of the CDH Problems over Finite Fields. Selected Area in Cryptography 2015, pages 441-461, 2015. [PDF]
- Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang. BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration. OPODIS 2014: 91-106. [PDF][DOI][Press]
- Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, and Haibin Zhang. ByzID: Byzantine Fault Tolerance from Intrusion Detection. SRDS 2014: 253-264. [PDF][DOI] Best Paper Candidate Award.
- Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang. P2S: A Fault-Tolerant Publish/Subscribe Infrastructure. DEBS 2014: 189-197. [PDF][DOI]
- Sherman Chow, Matthew Franklin, and Haibin Zhang. Practical Dual-Receiver Encryption: Soundness, Complete Non-Malleability, and Applications. CT-RSA 2014, LNCS 8366, pages 85–105, 2014. [PDF] Also available [ePrint archive]
- Matthew Franklin and Haibin Zhang. Unique Ring Signatures: A Practical Construction. Financial Cryptography and Data Security 2013, LNCS 7859, pages 162-170, 2013. [PDF]
- Matthew Franklin and Haibin Zhang. A Framework for Unique Ring Signatures. [PDF] Also available [ePrint archive]
- Phillip Rogaway, Mark Wooding, and Haibin Zhang. The Security of Ciphertext Stealing. FSE 2012, LNCS 7549, pages 180-195, 2012. [PDF]
- Matthew Franklin and Haibin Zhang. Unique Group Signatures. ESORICS 2012, LNCS 7459, pages 643-660, 2012. [PDF] [Full Paper] Also available [ePrint archive]
- Haibin Zhang. Length-Doubling Ciphers and Tweakable Ciphers. ACNS 2012, LNCS 7341, pages 100-116, 2012. [PDF]
- Phillip Rogaway and Haibin Zhang. Online Ciphers from Tweakable Blockciphers. CT-RSA 2011, LNCS 6558, pages 237-249, 2011. [PDF]
Some Other Research and Industry Impacts
-
I am one of the three main inventors of Norton Zone, Symantec’s Commercial Cloud Storage Platform.
-
Phil and I proved the security of ciphertext stealing for a NIST addendum. M. Dworkin. Recommendation for block cipher modes of operation: three variants of ciphertext stealing for CBC mode. Addendum to NIST Special Publication 800–38A. October 2010.
-
Unique ring signatures and Monero. Monero forked the unique ring siganture implementation of Hein Meling and me. The unique ring signature was due to Matt Franklin and me.
-
A clean definition of online cipher was introduced in our RSA 2011 paper and widely used in subsequent online encryption and online authenticated encryption schemes (including the CAESAR competition candidates).
-
The state of the art ABA protocol so far: CCS 2022 (Pillar). Pillar has on average 12 steps to terminate and assumes common coins and authenticated channels only.
-
Our WaterBear paper (USENIX Security 2023) contains the most efficient ABA protocol from weak common coins.
-
The most communication-efficient RBC so far: PODC 2022.
-
The most communication-efficient AVID so far: PODC 2022 (BA).
-
RABA (reprosable ABA) in our PACE paper is a powerful and useful distributed computing primitive: so far, we have successfully used it in many different settings (parallel BFT, ADKG, BFT with quantum security, and constant-time and signature-free BFT), but we DO feel it still has great potential in various other settings! Join us to use and develop this primitive!
Recent conferences in which I am invovled as a PC member (please consider submitting your work!):
ACM CCS 2025
NDSS 2025
ACM CCS 2024
NDSS 2024
PETS 2024 PC / PoPETs 2024 Editorial Board
ICDCN 2024
ACM CCS 2023
IEEE MASS 2023
ICICS 2023
Financial Cryptography and Data Security (FC) 2023
I am happy to serve as PC members and spend time in helping review papers. More importantly, I really want to advertise and promote international conferences in China, and help exchange academic ideas and advance knowledge. (The world is somewhat more disconneted due to COVID. No?:))
I am certainly biased, but I am particularly interested and committed in promoting less established but high-quality conferences in China. Doing so may help these conferences gain in popularity (e.g., by receiving more high-quality submissions), help researchers in China have more balanced research (now somewhat impacted by the CCF short list—some of those conferences not in the list, unfortunately, are ones with areas that are under-developed), and help researchers who published papers in these conferences get the recognization they deserve.