Shanghai Qi Zhi Institute PI, Professor at Shanghai Jiao Tong University.
Received a Bachelor's degree in Computer Science from Fudan University in 2003 and a Ph.D. degree from Nanyang Technological University in 2006. Subsequently, engaged in postdoctoral research at T-Systems and KU Leuven in Belgium. After returning to China in 2011, held positions at East China Normal University and Tsinghua University. Published multiple research papers in top-tier conferences in cryptography and information security, including CRYPTO, EUROCRYPT, ASIACRYPT, ACM CCS, IEEE S&P, and TCC. Delivered invited talks at the China Cryptography Conference, the Australian Cryptography Conference, and the Asian Cryptography Conference. Currently serves as a member of the ASIACRYPT Steering Committee, an observer on the International Association for Cryptologic Research (IACR) board, and a program committee member for CRYPTO 2021, EUROCRYPT 2020-2022, and ASIACRYPT 2018, 2020-2021. Engaged in research primarily focused on cryptography.
Post-Quantum Cryptography
Hash-based post-quantum digital signatures, in terms of signature time and size, outperform NIST-standardized post-quantum signature algorithm SPHINCS+.
Multi-party Computation
A new active safety constant round 2PC protocol is proposed, which is closest to the semi-honest half-gate protocol for one-way communication.
Post-Quantum Cryptography
Algebraic attack based on Rain and AIM's post-quantum digital signature scheme are proposed.
17. Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo & Hongrui Cui , Algebraic Attacks on Round-Reduced RAIN and Full AIM-III, ASIACRYPT, 2023 查看PDF
16. Kaiyi Zhang, Hongrui Cui, Yu Yu, Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS, CRYPTO, 2023 查看PDF
15. Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu, Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks, EUROCRYPT, 2023 查看PDF
14. Junqing Gong, Ji Luo, Hoeteck Wee, Traitor Tracing with N^{1/3}-Size Ciphertexts and O(1)-Size Keys from k-Lin, EUROCRYPT, 2023 查看PDF
13. Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng & Yu Yu, "Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)", Advances in Cryptology - CRYPTO 2020, pp 793-822,Book cover, 2020 查看PDF
12. Weijia Wang, Chun Guo†, François-Xavier Standaert, Yu Yu† & Gaëtan Cassiers, "Packed Multiplication: How to Amortize the Cost of Side-channel Masking?", Advances in Cryptology - ASIACRYPT 2020, pp 851-880, 2020 查看PDF
11. Wenling Liu, Zhen Liu†, Khoa Nguyen, Guomin Yang & Yu Yu†, "A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key", (ESORICS)in 25th European Symposium on Research in Computer Security - 2020, pp 357-377, 2020 查看PDF
10. Rui Wen,Yu Yu, Xiang Xie, Yang Zhang, "LEAF: A Faster Secure Search Algorithm via Localization,Extraction, and Reconstruction", (CCS 2020) In Proceedings of 27th ACM Conference on Computer and Communications Security, pp. 1219–1232, 2020 查看PDF
9. Yu Yu, Xiang Xie, Privacy-preserving computation in the post-quantum era, National Science Review, Volume 8, Issue 9, September 2021, 2021 查看PDF
8. Yu Yu, Preface to special topic on lattice-based cryptography , National Science Review, Volume 8, Issue 9, September 2021, 2021 查看PDF
7. Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu & Yu Yu†, MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK), (ESORICS)in 26th European Symposium on Research in Computer Security - 2021, pp 332-351, 2021 查看PDF
6. Hanlin Liu, Yu Yu†, Shuoyao Zhao, Jiang Zhang, Wenling Liu & Zhenkai Hu, Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact, Advances in Cryptology - CRYPTO 2021, pp 365-394, 2021 查看PDF
5. Yu Yu†, Jiang Zhang, Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN, Advances in Cryptology - CRYPTO 2021, pp 473-501, 2021 查看PDF
4. Liu-Jun Wang, Kai-Yi Zhang, Jia-Yong Wang, Jie Cheng, Yong-Hua Yang, Shi-Biao Tang, Di Yan, Yan-Lin Tang, Zhen Liu, Yu Yu†, Qiang Zhang† & Jian-Wei Pan†, 《Experimental authentication of quantum key distribution with post-quantum cryptography》, npj Quantum Information 7, 67, 2021 查看PDF
3. Li Yao, Yilei Chen, Yu Yu, Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs, Advances in Cryptology - EUROCRYPT 2022, pp 645-669, 2022 查看PDF
2. Hanlin Liu, Yu Yu†, A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW, Advances in Cryptology - ASIACRYT 2022, 2022 查看PDF
1. Yuanyuan Zhou, Joop van de Pol, Yu Yu†, Francois-Xavier Standaert, A Third is All You Need: EPKE attack on CRT with Exponent Blinding, Advances in Cryptology - ASIACRYT 2022, 2022 查看PDF