Publications

Bibliometrics can be found in Google Scholar.

2026

  • Perils of Parallelism: Transaction Fee Mechanisms under Execution Uncertainty
    Sarisht Wadhwa (Duke University), Aviv Yaish (Yale University, IC3, Complexity Science Hub Vienna), Fan Zhang (Yale University, IC3), Kartik Nayak (Duke University). In submission.
    AI Summary

    Parallel execution complicates fee design because users and schedulers can strategically exploit how the mechanism prices parallelism and execution uncertainty. This paper formalizes those tradeoffs and gives fee mechanisms that hit the best achievable boundary.

    Resources
    • Geographical Centralization Resilience in Ethereum's Block-Building Paradigms
      Sen Yang, Burak Öz, Fei Wu, Fan Zhang. In ACM SIGMETRICS 2026.
      AI Summary

      Ethereum's block-building paradigms cause geographic centralization through latency incentives, as shown via agent-based simulations.

    • Blockspace Under Pressure: An Analysis of Spam MEV on High-Throughput Blockchains
      Wenhao Wang, Aditya Saraf, Lioba Heimbach, Kushal Babel, Fan Zhang. In submission.
      AI Summary

      Cheap, high-throughput chains invite large volumes of speculative MEV traffic that mostly fails but still consumes blockspace and execution resources. This paper models that spam equilibrium and shows how capacity and fee design affect how much spam the chain attracts.

      Resources
      • Cirrus: Performant and Accountable Distributed SNARK
        Wenhao Wang (Yale University), Fangyan Shi (Tsinghua University), Dani Vilardell (Cornell University), Fan Zhang (Yale University). In Network and Distributed System Security (2026).
        AI Summary

        Cirrus is a distributed SNARK protocol achieving scalable, accountable proof generation with universal trusted setup.

      • Boost+: Equitable, Incentive-Compatible Block Building
        Mengqian Zhang, Sen Yang (Yale University), Kartik Nayak (Duke University), Fan Zhang (Yale University). In submission.
        AI Summary

        MEV-Boost centralizes Ethereum block building because vertically integrated actors get better access and stronger incentives than everyone else. Boost+ redesigns the market so transaction collection and ordering are separated, giving more equal access while preserving incentive compatibility.

        Publicity
        • Invited talk at DeCenter Seminar, Princeton, NJ. PPTX
        Resources
        • Censorship Resistance vs Throughput in Multi-Proposer BFT Protocols
          Fatima Elsheimy, Ioannis Kaklamanis, Sarisht Wadhwa, Charalampos Papamanthou, Fan Zhang. In submission.
          AI Summary

          Multi-proposer BFT systems cannot maximize both censorship resistance and throughput at the same time. This paper formalizes that tradeoff and gives assignment protocols that let designers choose better points on the spectrum.

          Highlights
          • Awarded Ethereum Academic Grant
          Resources
          • Dinocchio: Distributed Prover for Ring Arithmetic
            Katerina Sotiraki (Yale University), Yunhao Wang (Yale University), Fan Zhang (Yale University). In submission.
            AI Summary

            Dinocchio is a distributed SNARK for ring arithmetics. It distributes the prover while keeping proof size and verification time constant. It targets workloads from lattice cryptography and FHE that are inefficient to express over ordinary finite-field SNARKs.

            Resources

            2025

            • Verifiable Aggregate Receipts with Applications to User Engagement Auditing
              Ioannis Kaklamanis, Wenhao Wang (Yale University, IC3), Harjasleen Malvai (University of Illinois Urbana-Champaign, IC3), Fan Zhang (Yale University, IC3). In submission.
              AI Summary

              VAR lets a service prove how many users it served without revealing which users those were. The paper builds efficient receipt-based protocols for privacy-preserving audits that still prevent inflated engagement claims.

            • RediSwap: MEV Redistribution Mechanism for CFMMs
              Mengqian Zhang, Sen Yang, Fan Zhang. In Proceedings of the Workshop on Decentralized Finance and Security (DeFi ‘25).
              AI Summary

              RediSwap is a CFMM with an MEV-redistribution mechanism to mitigate exploitation and refund value to participants.

              Resources
                @inproceedings{10.1145/3733815.3764044,
                    author = {Zhang, Mengqian and Yang, Sen and Zhang, Fan},
                    title = {RediSwap: MEV Redistribution Mechanism for CFMMs},
                    year = {2025},
                    isbn = {9798400719042},
                    publisher = {Association for Computing Machinery},
                    address = {New York, NY, USA},
                    url = {https://doi.org/10.1145/3733815.3764044},
                    doi = {10.1145/3733815.3764044},
                    booktitle = {Proceedings of the 2025 Workshop on Decentralized Finance and Security},
                    pages = {27–36},
                    numpages = {10},
                    keywords = {Decentralized Finance, MEV Redistribution, Mechanism Design},
                    series = {DeFi '25}
                }
              • AGORA: Open More and Trust Less in Binary Verification Service
                Hongbo Chen, Quan Zhou, Sen Yang, Xing Han, Fan Zhang, Danfeng Zhang, Xiaofeng Wang. In ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2025).
                AI Summary

                AGORA enables open and trustworthy binary verification by delegating tasks and using TEEs with blockchain for auditability.

                Resources
                  @article{10.1145/3763099,
                      author = {Chen, Hongbo and Zhou, Quan and Yang, Sen and Dang, Sixuan and Han, Xing and Zhang, Danfeng and Zhang, Fan and Wang, XiaoFeng},
                      title = {Agora: Trust Less and Open More in Verification for Confidential Computing},
                      year = {2025},
                      issue_date = {October 2025},
                      publisher = {Association for Computing Machinery},
                      address = {New York, NY, USA},
                      volume = {9},
                      number = {OOPSLA2},
                      url = {https://doi-org.yale.idm.oclc.org/10.1145/3763099},
                      doi = {10.1145/3763099},
                      journal = {Proc. ACM Program. Lang.},
                      month = oct,
                      articleno = {321},
                      numpages = {28},
                      keywords = {Program verification, confidential computing, smart contract, static analysis, trusted computing base}
                  }
                • Qelect: Lattice-based Single Secret Leader Election Made Practical
                  Yunhao Wang, Fan Zhang (Yale University). In USENIX Security 2025.
                  AI Summary

                  Qelect introduces a lattice-based, constant-round post-quantum SSLE protocol with practical optimizations for significant speed improvements.

                  Resources
                    @inproceedings{DBLP:conf/uss/WangZ25,
                    author       = {Yunhao Wang and
                                    Fan Zhang},
                    editor       = {Lujo Bauer and
                                    Giancarlo Pellegrino},
                    title        = {Qelect: Lattice-based Single Secret Leader Election Made Practical},
                    booktitle    = {34th {USENIX} Security Symposium, {USENIX} Security 2025, Seattle,
                                    WA, USA, August 13-15, 2025},
                    pages        = {8461--8480},
                    publisher    = {{USENIX} Association},
                    year         = {2025},
                    url          = {https://www.usenix.org/conference/usenixsecurity25/presentation/wang-yunhao},
                    timestamp    = {Fri, 31 Oct 2025 16:17:35 +0100},
                    biburl       = {https://dblp.org/rec/conf/uss/WangZ25.bib},
                    bibsource    = {dblp computer science bibliography, https://dblp.org}
                    }
                  • ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution Environments
                    Michael Rosenberg, Maurice Shih, Zhenyu Zhao, Rui Wang, Ian Miers, and Fan Zhang. In Privacy Enhancing Technologies Symposium (PETS 2025).
                    AI Summary

                    ZIPNet enables scalable, low-bandwidth anonymous broadcast by minimizing server costs via untrusted message aggregation.

                    Highlights
                    Publicity
                    • Invited talk at NoConsensus.wtf 2025 @ SBC, Berkeley, CA.
                    Resources
                      @article{DBLP:journals/popets/RosenbergSZWMZ25,
                      author       = {Michael Rosenberg and
                                      Maurice Shih and
                                      Zhenyu Zhao and
                                      Rui Wang and
                                      Ian Miers and
                                      Fan Zhang},
                      title        = {ZIPNet: Low-bandwidth anonymous broadcast from (dis)Trusted Execution
                                      Environments},
                      journal      = {Proc. Priv. Enhancing Technol.},
                      volume       = {2025},
                      number       = {2},
                      pages        = {211--225},
                      year         = {2025},
                      url          = {https://doi.org/10.56553/popets-2025-0058},
                      doi          = {10.56553/POPETS-2025-0058},
                      timestamp    = {Mon, 12 May 2025 17:34:54 +0200},
                      biburl       = {https://dblp.org/rec/journals/popets/RosenbergSZWMZ25.bib},
                      bibsource    = {dblp computer science bibliography, https://dblp.org}
                      }
                    • Decentralization of Ethereum's Builder Market
                      Sen Yang, Kartik Nayak, Fan Zhang. In IEEE S&P 2025.
                      AI Summary

                      Empirical analysis shows builder centralization in Ethereum harms decentralization and necessitates supply chain changes.

                      Publicity
                      • Guest lecture at Berkeley DeFi MOOC.
                      • Invited talk at CBER Crafting the Cryptoeconomy Conference. PPTX
                      • Invited talk at Decentralized Science (DeSci) Seminar, University of Sydney (Remote).
                      • Invited talk at Science of Blockchain Conference 2024 (SBC'24), New York, NY. Video
                      • Invited talk at IC3 Blockchain Camp, New York, NY.
                      • Invited talk at EC24 Workshop on Blockchains and Decentralized Finance.
                      Resources
                        @inproceedings{yangDecentralizationEthereumsBuilder2025,
                          title = {Decentralization of {{Ethereum}}'s {{Builder Market}}},
                          author = {Yang, Sen and Nayak, Kartik and Zhang, Fan},
                          date = {2025-05-01},
                          pages = {1512--1530},
                          publisher = {IEEE Computer Society},
                          doi = {10.1109/SP61157.2025.00157},
                          url = {https://www.computer.org/csdl/proceedings-article/sp/2025/223600b456/26hiUkhZyfK},
                          urldate = {2025-06-19},
                          eventtitle = {2025 {{IEEE Symposium}} on {{Security}} and {{Privacy}} ({{SP}})},
                          isbn = {979-8-3315-2236-0},
                          langid = {english}
                        }
                      • Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source Contracts
                        Sen Yang, Kaihua Qin, Aviv Yaish,Fan Zhang. In submission.
                        AI Summary

                        Obfuscation hides vulnerabilities in smart contracts, as SKANF detects exploits in MEV bots causing major losses.

                        Highlights
                      • Prooφ: A ZKP Market Mechanism
                        Wenhao Wang, Lulu Zhou, Aviv Yaish, Fan Zhang, Ben Fisch, Benjamin Livshits. In Financial Cryptography and Data Security (FC 2025).
                        AI Summary

                        Designing a transaction fee mechanism for prover markets in ZK-Rollups to ensure efficiency and resist collusion.

                        Resources
                        • Presented at ZK Summit 11 (Athens), Tokenomics'24 (Hong Kong), FC'25 (Japan), TLDR'25, IC3 Blockchain Camp'25
                      • Anonymous Self-Credentials and their Application to Single-Sign-On
                        Jayamine Alupotha, Mariarosaria Barbaraci (University of Bern), Ioannis Kaklamanis (Yale University), Abhimanyu Rawat (Universitat Pompeu Fabra), Christian Cachin (University of Bern), Fan Zhang (Yale University). In submission.
                        AI Summary

                        Proposes Anonymous Self-Credentials for privacy-preserving and Sybil-resistant single sign-on without trusted providers.

                        Resources
                        • AUCIL: An Inclusion List Design for Rational Parties
                          Sarisht Wadhwa (Duke University), Julian Ma, Thomas Thiery, Barnabe Monnot, Luca Zanolini (Ethereum Foundation), Fan Zhang (Yale University), Kartik Nayak (Duke University). In submission.
                          AI Summary

                          Introduces a formal inclusion list design using auction-based mechanisms to enhance censorship resistance in blockchains with rational proposers.

                        • CRATE: Cross-Rollup Atomic Transaction Execution
                          Ioannis Kaklamanis, Fan Zhang (Yale University). In submission.
                          AI Summary

                          CRATE enables secure, atomic cross-rollup transaction execution with formal guarantees and practical implementation.

                          Resources

                          2024

                          • SoK: MEV Countermeasures
                            Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, Feng Zhu. In Proceedings of the Workshop on Decentralized Finance and Security (DeFi 2024).
                            AI Summary

                            This survey systematizes MEV countermeasures by presenting a taxonomy and analyzing their effectiveness against security problems.

                          • Unpacking Long-Latency Transactions in Ethereum
                            Chon Kit Lao, Sophie Zhou, Luyao Zhang, Fan Zhang, Kanye Ye Wang. In Proceedings of the Workshop on Decentralized Finance and Security (DeFi 2024).
                            AI Summary

                            Measures resource impact and identifies causes of long-latency transactions in Ethereum using Geth analysis.

                            Resources
                            • (Book Chapter) Web3: Blockchain, the New Economy, and the Self-Sovereign Internet
                              Ken Huang, DistributedApps.ai, Youwei Yang, Bit Mining Limited, Fan Zhang, Yale University, Xi Chen, New York University, Feng Zhu, Harvard Business School. In Cambridge Press.
                              AI Summary

                              This book chapter educates on Web3 technologies, focusing on scalability and tokenomics.

                              Resources
                            • CrudiTEE: A Stick-and-Carrot Approach to Building Trustworthy Cryptocurrency Wallets with TEEs
                              Lulu Zhou, Zeyu Liu, Fan Zhang, Michael K. Reiter. In ACM Advances in Financial Technologies (AFT 2024).
                              AI Summary

                              CrudiTEE secures TEE-based wallets with economic incentives and MDP modeling against side-channel attacks.

                              Resources
                              • Data Independent Order Policy Enforcement: Limitations and Solutions
                                Sarisht Wadhwa, Luca Zanolini, Francesco D’Amato, Aditya Asgaonkar, Kartik Nayak, and Fan Zhang. In ACM CCS 2024.
                                AI Summary

                                Proves impossibility of data-independent order policy enforcement under rationality and designs AnimaguSwap using rationally binding transactions for security.

                                Resources
                                • Sprints: Intermittent Blockchain PoW Mining
                                  Michael Mirkin, Lulu Zhou, Ittal Eyal, Fan Zhang. In USENIX Security 2024.
                                  AI Summary

                                  Sprints is a blockchain protocol that uses intermittent PoW mining with PoD to reduce ecological impact while maintaining security.

                                2023

                                • The Locality of Memory Checking
                                  Weijie Wang, Yujie Lu, Charalampos Papamanthou, and Fan Zhang. In ACM CCS 2023.
                                  AI Summary

                                  Introduces locality in memory checking for blockchain storage, proves lower bounds, and designs efficient authenticated data structures.

                                • Fed-CBS: A Heterogeneity-Aware Client Sampling Mechanism for Federated Learning via Class-Imbalance Reduction
                                  Zhang, Jianyi and Li, Ang and Tang, Minxue and Sun, Jingwei and Chen, Xiang and Zhang, Fan and Chen, Changyou and Chen, Yiran and Li, Hai. In Proceedings of the 40th International Conference on Machine Learning, PMLR 202:41354-41381, 2023.
                                  AI Summary

                                  Fed-CBS improves federated learning by selecting clients to reduce class-imbalance via a privacy-preserving measure.

                                • MISO: Legacy-compatible Privacy-preserving Single Sign-on using Trusted Execution Environments
                                  Xu, Rongwu and Yang, Sen and Zhang, Fan and Fang, Zhixuan. In IEEE EuroS&P 2023.
                                  AI Summary

                                  MISO uses TEEs to enable privacy-preserving, legacy-compatible SSO with multi-provider support.

                                • He-HTLC: Revisiting Incentives in HTLC
                                  Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak. In Network and Distributed System Security (2023).
                                  AI Summary

                                  He-HTLC is a secure HTLC specification that resists incentive manipulation by considering actively rational miners.

                                  Publicity
                                  • Invited talk at IC3 Blockchain Camp, Ithaca, NY.
                                  • Invited talk at a16z, New York, NY.

                                2022

                                • zkBridge: Trustless Cross-chain Bridges Made Practical
                                  Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, and Dawn Song. In ACM CCS 2022.
                                  AI Summary

                                  zkBridge provides an efficient trustless cross-chain bridge using succinct proofs for secure interoperability.

                                  Highlights
                                  • zkBridge is implemented by Polyhedra Network.
                                  Publicity
                                  • Invited talk at IC3 Blockchain Camp, New York, NY.
                                  • Invited talk at 1st ACE Symposium on Privacy, Accountability, Verification, and Economics of Blockchain Systems, New Haven, CT.
                                • Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security
                                  Y. Liu, Y. Lu, K. Nayak, F. Zhang, L. Zhang, Y. Zhao. In ACM CCS 2022.
                                  AI Summary

                                  EIP-1559 improves user experience with easier fees and lower wait times, but has little effect on fees and security.

                                  Highlights

                                2021

                                • CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
                                  D. Maram, H. Malvai, F. Zhang, N. Jean-Louis, A. Frolov, T. Kell, T. Lobban, C. Moy, A. Juels, and A. Miller. In IEEE S&P 2021.
                                  AI Summary

                                  CanDID is a decentralized identity platform offering legacy compatibility, Sybil-resistance, and privacy-preserving accountability.

                                  Publicity
                                  • Invited talk at The West Lake Forum on Network Security, Online.
                                  • Invited talk at Annual Convention of Chinese Institute of Engineers - Greater New York Chapter.
                                  • Invited talk at Empire Hacking (organized by Trail of Bits).
                                  Resources

                                  2020

                                  • Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
                                    S. Allen, S. Čapkun, I. Eyal, G. Fanti, B. Ford, J. Grimmelmann, A. Juels, K. Kostiainen, S. Meiklejohn, A. Miller, E. Prasad, K. Wüst, and F. Zhang (Authors are ordered alphabetically). In NBER Working Paper No. 27634.
                                    AI Summary

                                    Surveys technical challenges and solutions for CBDCs, with a vision for future capabilities.

                                  • The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
                                    F. Zhang, W. He, R. Cheng, J. Kos, N. Hynes, N. Johnson, A. Juels, A. Miller, and D. Song. In IEEE Security & Privacy Magazine (Volume: 18, Issue: 3, May-June 2020).
                                    AI Summary

                                    Ekiden integrates blockchain and TEEs for confidential and efficient smart contracts.

                                    Resources
                                    • DECO: Liberating Web Data Using Decentralized Oracles for TLS
                                      F. Zhang, SKD Maram, H. Malvai, S. Goldfeder, and A. Juels. In ACM CCS 2020.
                                      AI Summary

                                      DECO enables verifiable proof of web data provenance via TLS using decentralized oracles and zero-knowledge proofs.

                                      Highlights
                                      Publicity
                                      • Invited talk at W3C Credential Community Group (CCG).
                                      • Invited talk at Stanford Blockchain Conference (SBC'20), Stanford University.
                                      • Invited talk at Real World Crypto (RWC'20), New York City.
                                    • Order-Fairness for Byzantine Consensus
                                      M. Kelkar, F. Zhang, S. Goldfeder, and A. Juels. In The Annual International Cryptology Conference (CRYPTO 2020).
                                      AI Summary

                                      Introduces transaction order-fairness as a new consensus property and proposes Aequitas protocols to achieve it in Byzantine systems.

                                      Resources

                                      2019

                                      • CHURP: Dynamic-Committee Proactive Secret Sharing
                                        SKD Maram*, F. Zhang*, L. Wang, A. Low, Y. Zhang, A. Juels, and D. Song (*indicates equal contribution). In ACM CCS 2019.
                                        AI Summary

                                        CHURP enables proactive secret sharing for dynamic committees in blockchains with low communication complexity.

                                        Highlights
                                        Publicity
                                        • Invited talk at ACM CCS'19, London, UK.
                                        • Invited talk at IC3 Bootcamp, Ithaca, NY.
                                      • Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
                                        I. Bentov, Y. Ji, F. Zhang, Y. Li, X. Zhao, L. Breidenbach, P. Daian, and A. Juels. In ACM CCS 2019.
                                        AI Summary

                                        Tesseract uses Intel SGX and consensus to enable secure, real-time cross-chain cryptocurrency exchanges and asset tokenization.

                                      • Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
                                        R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes, N. M. Johnson, A. Juels, A. Miller, and D. Song. In IEEE EuroS&P 2019.
                                        AI Summary

                                        Ekiden combines blockchains with TEEs to provide confidentiality and high performance for smart contracts through a novel separated consensus-execution architecture.

                                        Highlights
                                        Resources
                                          @inproceedings{chengEkiden2019,
                                            title = {Ekiden: {{A Platform}} for {{Confidentiality-Preserving}}, {{Trustworthy}}, and {{Performant Smart Contracts}}},
                                            shorttitle = {Ekiden},
                                            booktitle = {2019 {{IEEE European Symposium}} on {{Security}} and {{Privacy}} ({{EuroS}}\&{{P}})},
                                            author = {Cheng, Raymond and Zhang, Fan and Kos, Jernej and He, Warren and Hynes, Nicholas and Johnson, Noah and Juels, Ari and Miller, Andrew and Song, Dawn},
                                            date = {2019-06},
                                            pages = {185--200},
                                            doi = {10.1109/EuroSP.2019.00023},
                                            eventtitle = {2019 {{IEEE European Symposium}} on {{Security}} and {{Privacy}} ({{EuroS}}\&{{P}})},
                                            keywords = {blockchain,Blockchain,confidentiality preserving smart contracts,Cryptography,Hardware,smart contracts,Smart contracts,trusted hardware},
                                          }
                                          
                                        • Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More
                                          F. Zhang, P. Daian, I. Bentov, I. Miers, and A. Juels. In ACM Advances in Financial Technologies (AFT 2019).
                                          AI Summary

                                          Proposes Paralysis Proofs to enable dynamic updates in access structures for digital assets, balancing security and availability.

                                        2017

                                        • REM: Resource-Efficient Mining for Blockchains
                                          F. Zhang, I. Eyal, R. Escriva, A. Juels, and R. van Renesse. In USENIX Security Symposium (Security 2017).
                                          AI Summary

                                          REM leverages Intel SGX to implement Proof-of-Useful-Work, reducing computational waste in blockchain mining.

                                          Highlights
                                          Publicity
                                          • Invited talk at USENIX Security'17, Vancouver, BC, Canada.
                                          Resources
                                          • Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
                                            F. Tramèr, F. Zhang, H. Lin, Jean-Pierre Hubaux, A. Juels, and E. Shi. In IEEE EuroS&P 2017.
                                            AI Summary

                                            Sealed-Glass Proofs enable secure verifiable computing in transparent enclaves despite side-channels, applied to bug bounty platforms.

                                          • Solidus: Confidential Distributed Ledger Transactions via PVORM
                                            E. Cecchetti, F. Zhang, Y. Ji, A. E. Kosba, A. Juels, and E. Shi. In ACM CCS 2017.
                                            AI Summary

                                            Solidus enables confidential and verifiable transactions on public blockchains via PVORM, hiding values and identities.

                                          2016

                                          2015

                                          • PlateClick: Bootstrapping Food Preferences Through an Adaptive Visual Interface
                                            L. Yang, Y. Cui, F. Zhang, J. P. Pollak, S. Belongie, and D. Estrin. In ACM Conference on Information and Knowledge Management (CIKM 2015).
                                            AI Summary

                                            PlateClick bootstraps food preferences via a visual interface with CNN-based similarity learning and online preference propagation, validated in a field study.

                                            Resources