Fan Zhang

Assistant Professor

I’m broadly interested in computer security and applied cryptography, especially techniques that enable Secure Decentralized Systems, a novel class of computer systems with unique security properties (such as transparency, verifiability, decentralized trust and governance).

My research aims to advance the technical foundation of decentralized systems, analyze the security of real-world deployments, and build practical tools to support applications in socially important domains.

I’m also affiliated with IC3, Center for Distributed Confidential Computing (CDCC) and Center for Algorithms, Data, and Market Design at Yale (CADMY).

At Yale, I teach Intro to Blockchain and Real-World Cryptography.

Updates

Research: Secure Decentralized Systems

Building computer systems with transparency and integrity guarantees is a dream of security and cryptography research. As society grows more dependent on digital infrastructure, this goal is more urgent than ever.

Over the past decade, Secure Decentralized Systems, powered by cryptography and large-scale consensus protocols, have emerged as a promising path toward this vision, with early success in areas like stablecoins and Decentralized Finance.

My research advances the technical foundations of decentralized systems to support transformative applications. Specifically, I work on:

1️⃣ Cryptographic Building Blocks for Decentralized Systems

[+]

We devise and improve fundamental cryptographic techniques underpinning secure decentralized systems.

Oracles (zkTLS).

Oracles originate as systems to supply verifiable data to smart contracts, but applications go far beyond. Our papers Town Crier and DECO were among the first to formalize oracle security and realize it via verifiable provenance of TLS-encrypted data, turning HTTPS websites into sources of verifiable claims. These works initiated a rich exploration of the cryptographic techniques, as well as many real-world implementations.

🛠 In 2024, DECO became part of Chainlink’s Privacy Suite product. Town Crier was licensed to Chainlink as well. In addition, at least ten startup companies are building variants of these works, collectively known as zkTLS.
TEEs.

Trusted Execution Environments (TEEs) are CPU-enforced mechanisms that enable remote program execution with confidentiality and integrity guarantees. We apply TEEs to enhance decentralized systems, for confidentiality (Ekiden), frontrunning prevention (Tesseract), energy efficiency (REM), and client-side security (Paralysis Proofs, CrudiTEE).

We devise new trust models of TEEs so systems can rely on TEEs while enjoying graceful degradation. Our exploration includes tolerating full leakage (Sealed Glass Proof), detecting leakage (ZipNet), or incentivizing reporting of leakage (CrudiTEE).

🛠 Ekiden is implemented by Oasis Labs. ZipNet is being implemented by Flashbots.
FHE and ZKPs.

Decentralized systems must withstand powerful attacks, often requiring heavyweight cryptographic machinery such as fully homomorphic encryption (FHE) and zero-knowledge proofs (ZKPs). Our recent work has contributed to efficiency improvements in the application of these primitives to decentralized systems, exploiting protocol-level optimization (Qelect), parallelism (zkBridge, Cirrus), and outsourcing (Prooφ).

🛠 zkBridge is implemented by Polyhedra Network.

2️⃣ Incentives, Mechanism Design, and Security

[+]

Traditional security analysis models participants as either honest or malicious, but participants in decentralized systems are economically motivated. Leveraging incentives properly can achieve unprecedented guarantees, but abusing incentives can lead to effective attacks.

Bribery attacks.

Powerful attack vector where an attacker spends money bribing parties to take specific actions for even bigger profit.

  • He-HTLC presents a model where rational participants can actively seek economic incentives by, for example, altering the software they run, and demonstrates that prior HTLC designs are vulnerable in this model, and proposed a secure design called He-HTLC.
  • Our CCS'24 paper showed that threshold-encryption-based MEV mitigation protocols are vulnerable to an attack where participants are bribed to reveal the encryption key in a way that avoids accountability. We also present a novel solution.
Leverage incentive for defense.
  • CrudiTEE explores a new approach to TEE side-channel mitigation through economic incentives, specifically for TEE-based cryptocurrency wallets. By taking into account the cost and profit of side-channel attacks, CrudiTEE can disincentivize attackers from exfiltrating signing keys in the first place.
How to price computation in decentralized systems?
  • Our CCS'21 paper examined the real-world consequences of the then new transaction fee mechanism (TFM).
  • Prooφ proposes a mechanism for zero-knowledge proof markets, featuring co-designed security mechanisms to complement mechanism design techniques.
🛠 The Prooφ team contributed to the whitepaper of Fermeh, a startup building a proof market.

3️⃣ Security of Decentralized Finance, Social Media, and AI

[+]
DeFi and MEV.

DeFi has some unique advantages over traditional finance, but it gives rise to Miner Extractable Value (MEV), impacting security and decentralization. We work on understanding and mitigating negative consequences of MEV.

  • “Decentralization of Ethereum’s Builder Market” analyzes Ethereum’s hyper-centralized builder market. It reveals dynamics leading to builder centralization and quantifies the consequences through proposer loss. (Presented at SBC'24, CBER CtCC, EC'24 Workshop, S&P'25. Reported by Wisdom of DeFi by EigenPhi.)
  • RediSwap is an AMM that captures MEV and refund it fairly among users and liquidity providers.
Identity.

Improving digital identity with principles and tools from decentralized systems.

  • Anonymous Self-Credentials (ASC): bootstrapping anonymous credential from Sybil-proof blockchain identities.
  • MISO: making SSO anonymous without changing SSO. The key idea is to mix SSO sessions.
  • CanDID: a platform for practical, user-friendly realization of decentralized identity, the idea of empowering end users with management of their own credentials.

For a complete list of papers, see the publication page for an up-to-date list of papers

Interested in working with me?

  • For Yale undergrads: we enjoy having undergrad researchers in our lab to help them gain research experience. Feel free to get in touch.
  • We have openings for Postdocs, visiting scholars, and summer interns for strong candidates.

Contact