Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile
Cheng Hong 洪澄

@chenghong_ustc

Director of Cryptography and Privacy Research,
@AntGroup

ID: 1268745526100455424

linkhttps://antcplab.github.io/ calendar_today05-06-2020 03:24:51

128 Tweet

476 Takipçi

239 Takip Edilen

Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

This year's IEEE S&P really provides a good hybrid conference experience. Easy-to-access livestream in Whova, well adjusted network. Most of the sessions we feel no problem when listening and asking questions to remote authors. Hope other conferences could be done in this way.

This year's <a href="/IEEESSP/">IEEE S&P</a> really provides a good hybrid conference experience. Easy-to-access livestream in Whova, well adjusted network. Most of the sessions we feel no problem when listening and asking questions to remote authors. Hope other conferences could be done in this way.
Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

Our new results on MPC binary circuits (three-party, honest majority) has been accepted by USENIX'Sec 2023. This is more than 3x faster than previous state-of-the-art.

Bloomberg (@business) 's Twitter Profile Photo

Ant Group spent a record $2.9 billion on research last year as the fintech giant increased its investment in technology including AI trib.al/B6UBxpo

Carl Zha (@carlzha) 's Twitter Profile Photo

I love how Black Myth: Wukong starts with the Monkey King Sun Wukong fighting God Erlang Shen, the highlight of Monkey King Wrecking Havoc in Heaven, 1 of the most beloved chapter in the novel Journey to the West. It marks Wukong as the ultimate rebel

Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

Introducing our new result Coral (to appear in ACM CCS 2024), which implements the world's first RMFE (Reverse Multiplication-Friendly Embedding) library. eprint.iacr.org/2024/1372

Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

Private Set Intersection (PSI) is perhaps one of the most frequently used privacy preserving techniques in production, however there are too many PSI protocols available. We wrote an ietf draft trying to standardize the simplest ECDH-PSI. datatracker.ietf.org/doc/draft-ecdh…

ScienceOpen (@science_open) 's Twitter Profile Photo

'Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption' an article on #ScienceOpen: scienceopen.com/document?vid=5…

Jiao Sun (@sunjiao123sun_) 's Twitter Profile Photo

Mitigating racial bias from LLMs is a lot easier than removing it from humans! Can’t believe this happened at the best AI conference NeurIPS Conference We have ethical reviews for authors, but missed it for invited speakers? 😡

Mitigating racial bias from LLMs is a lot easier than removing it from humans! 

Can’t believe this happened at the best AI conference <a href="/NeurIPSConf/">NeurIPS Conference</a> 

We have ethical reviews for authors, but missed it for invited speakers? 😡
Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

Excited to share our CHES 2025 paper on Fully Homomorphic Encryption (FHE)! FHE suffers from high encryption costs, and Transciphering is a technique that mitigate such costs by encrypting with some efficient symmetric encryption method (e.g., AES), then the server converts

Cheng Hong 洪澄 (@chenghong_ustc) 's Twitter Profile Photo

Fully Homomorphic Encryption (FHE) ensures data confidentiality, but not integrity: Clients have no way to verify whether the results are correctly computed. While Zero-Knowledge Proofs can solve this problem, they come at a high cost—up to 10,000x more expensive than FHE.