Portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 1
Published:
Short description of portfolio item number 2
Published in Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17), Boston, March, 2017
This paper presents Splinter, a system that protects users’ queries on public datasets while achieving practical performance for many current web applications.
Recommended citation: Frank Wang, Catherine Yun, Shafi Goldwasser, and Vinod Vaikuntanathan. (2017). "Splinter: Practical Private Queries on Public Data." In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI '17), Boston, March. https://www.usenix.org/system/files/conference/nsdi17/nsdi17-wang-frank.pdf
Published March 2018
With TxVM we seek to combine the respective strengths of the declarative and imperative approaches to representing blockchain transactions, while avoiding their weaknesses.
Recommended citation: Bob Glickstein, Cathie Yun, Dan Robinson, Keith Rarick, Oleg Andreev. (2018). "TxVM: A New Design for Blockchain Transactions.". https://chain.com/assets/txvm.pdf
Published May 2019
In this paper, we present ZkVM, the zero-knowledge virtual machine: a transaction format for a shared, multi-asset, cryptographic ledger.
Recommended citation: Oleg Andreev, Bob Glickstein, Vicki Niu, Tess Rinearson, Debnil Sur, Cathie Yun. (2019). "ZkVM: fast, private, flexible blockchain contracts." https://github.com/stellar/slingshot/files/3164245/zkvm-whitepaper-2019-05-09.pdf
Published in Under submission, 2022
This paper presents ACORN, an secure aggregation extension that enables input validation to prevent malicious clients from gaining disproportionate influence on the computed aggregated statistics or machine learning model.
Recommended citation: James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun. (2022). "ACORN: Input Validation for Secure Aggregation." https://eprint.iacr.org/2022/1461
Published:
Video and Slides. In this talk, I announce TxVM, a powerful new design for blockchain transactions. TxVM seeks to achieve the expressiveness and flexibility of an imperative contract model such as Ethereum’s while maintaining the efficiency, safety, and scalability of a declarative transaction model such as Bitcoin’s.
Published:
Video and Slides. In this talk, I discuss how we implemented the R1CS (rank one constraint system) API for flexibly programming proofs with the Bulletproofs zero knowledge proof system. I also discuss how to build a confidential assets protocol, as well as how to make a usable smart contract language, using that API. This talk is a precursor to the official release of ZkVM, the zero knowledge smart contract language that we developed using these techniques.
Published:
Video and Slides. In this talk, Oleg and I announce ZkVM, the zero-knowledge virtual machine. ZkVM is an experimental multi-asset blockchain architecture for scalable and confidential smart contracts.
Published:
Video. Zero knowledge proofs are powerful tools; come learn about how they work and what they enable! We’ll get down and dirty in the details of Bulletproofs, a zero knowledge proof protocol that doesn’t require trusted setup. I’ll walk you through the math/crypto of Bulletproofs, alongside my open-source implementation in Rust. You’ll walk away with an appreciation for zero knowledge proofs, a deeper understanding of Bulletproofs, and hopefully some interest in tinkering on or building systems with zero knowledge proof protocols yourself!
Published:
Video and Slides. I talk about how the math behind the Bulletproofs paper works, going through the inner product proof and showing how a range proof can be constructed.
Published:
Video. This talk is a peek inside the cryptography security review process at Google, looking at the Trust Tokens protocol based on Privacy Pass. I reviewed this protocol before it was deployed, and it is now in use in Google Chrome help Chrome differentiate between bots and real users.
Published:
Video. I sat on an “Ask Me Anything” panel at Real World Crypto 2022 to talk about the relationship between cryptography research and its use in industry, give advice to folks starting out their cryptography career, and to defend the usefulness of blockchains (at least, as a way to fund really cool cryptography research).
Published:
Shruthi and I gave a talk at Safer With Google, the Google internal security summit, about our team’s work on making Fully Homomorphic Encryption (FHE) practical. The video and slides are not available to the public, but Googlers can view them at the internal golink: go/swg-summit.
Published:
I presented on Google’s work toward real-world deployment of FHE, at the NIST Crypto Reading Club. Slides here, recording will be posted once it is uploaded.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.