K
Kang Yang
Publications - 8
Citations - 267
Kang Yang is an academic researcher. The author has contributed to research in topics: Computer science & Security parameter. The author has an hindex of 6, co-authored 8 publications receiving 81 citations.
Papers
More filters
Proceedings ArticleDOI
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
TL;DR: A new protocol for constant-round interactive ZK proofs that simultaneously allows for a highly efficient prover and low communication and an improved subfield Vector Oblivious Linear Evaluation (sVOLE) protocol with malicious security that is of independent interest is presented.
Proceedings ArticleDOI
Ferret: Fast Extension for Correlated OT with Small Communication
TL;DR: A semi-honest COT protocol with sublinear communication and linear computation that achieves unprecedented performance and features a new checking technique that ensures correctness and consistency essentially for free.
Proceedings ArticleDOI
QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
TL;DR: In this article, the authors proposed several constant-round ZK protocols in the circuit-based model, which improve the concrete efficiency and enable sublinear amortized communication for circuits with some notion of relaxed uniformity.
Posted Content
More Efficient MPC from Improved Triple Generation and Authenticated Garbling.
Kang Yang,Xiao Wang,Jiang Zhang +2 more
TL;DR: A new protocol for generating authenticated AND triples, which is a key building block in many recent works, is proposed and a new authenticated bit protocol is proposed in the two-party and multi-party settings from bare IKNP OT extension, allowing to reduce the communication by about $24% and eliminate many computation bottlenecks.
Proceedings ArticleDOI
More Efficient MPC from Improved Triple Generation and Authenticated Garbling
Kang Yang,Xiao Wang,Jiang Zhang +2 more
TL;DR: In this paper, the authors proposed a new protocol for generating authenticated AND triples, which is a key building block in many recent works, and they implemented their triple generation protocol and observe around $4\times$ to $5\times $ improvement compared to the best prior protocol in most settings.