Conferences and Journals
EPIC: Efficient Asynchronous BFT with Adaptive Security.
Chao Liu, Sisi Duan, and Haibin Zhang.
IEEE/IFIP DSN 2020.
On the Universally Composable Security of OpenStack. [ePrint version (125 pages)]
Kyle Hogan, Hoda Maleki, Reza Rahaeimehr, Ran Canetti, Marten van Dijk, Jason Hennessey, Mayank Varia, Haibin Zhang.
IEEE SecDev 2019.
On the Origins and Variations of Blockchain Technologies. [arXiv version]
Alan Sherman, Farid Javani, Haibin Zhang, and Enis Golaszewski.
IEEE Security & Privacy, 2019.
BEAT: Asynchronous BFT Made Practical. [PDF]
Sisi Duan, Michael. K. Reiter, and Haibin Zhang.
The 25th ACM Conference on Computer and Communications Security (CCS 2018).
A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary. [PDF]
Siddhant Goenka, Sisi Duan, and Haibin Zhang.
The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018).
Secure Causal Atomic Broadcast, Revisited. [PDF]
Sisi Duan, Michael. K. Reiter, and Haibin Zhang.
47th IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN 2017).
Real Hidden Identity-Based Signatures. [PDF]
Sherman S.M. Chow, Haibin Zhang, and Tao Zhang.
21st International Conference on Financial Cryptography and Data Security 2017 (FC 2017).
Byzantine Reliable Broadcast in Sparse Networks. [PDF]
Sisi Duan, Lucas Nicely, and Haibin Zhang.
The 15th IEEE International Symposium on Network Computing and Applications (NCA 2016), 2016.
Norton Zone: Symantec's Secure Cloud Storage System. [PDF]
Walter Bogorad, Scott Schneider, and Haibin Zhang.
IEEE 35th Symposium on Reliable Distributed Systems (SRDS 2016), 2016.
Practical State Machine Replication with Confidentiality. [PDF]
Sisi Duan and Haibin Zhang.
IEEE 35th Symposium on Reliable Distributed Systems (SRDS 2016), 2016.
Bit Security of the CDH Problems over Finite Fields.[PDF] [ePrint archive]
Mingqiang Wang, Tao Zhan, and Haibin Zhang.
Selected Area in Cryptography 2015, pages 441-461, 2015.
BChain: Byzantine Replication with High Throughput
and Embedded Reconfiguration. [PDF]
Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang.
18th International Conference on Principles of Distributed Systems (OPODIS 2014), pages 91-106, 2014.
ByzID: Byzantine Fault Tolerance from Intrusion Detection. [PDF]
Sisi Duan, Karl Levitt, Hein Meling, Sean Peisert, and Haibin Zhang.
IEEE 33rd Symposium on Reliable Distributed Systems (SRDS 2014), pages 253-264, 2014. (Best paper candidate award.)
P2S: A Fault-Tolerant Publish/Subscribe Infrastructure. [PDF]
Tiancheng Chang, Sisi Duan, Hein Meling, Sean Peisert, and Haibin Zhang.
DEBS 2014, pages 189-197, ACM, 2014.
Practical Dual-Receiver Encryption: Soundness, Complete Non-Malleability, and Applications.
[Full Paper]. Also available: [ePrint archive]
Sherman Chow, Matthew Franklin, and Haibin Zhang.
CT-RSA 2014, LNCS 8366, pages 85–105, 2014.
Unique Ring Signatures: A Practical Construction.[PDF]
Matthew Franklin and Haibin Zhang.
Financial Cryptography and Data Security 2013, LNCS 7859, pages 162-170, 2013.
A Framework for Unique Ring Signatures.[PDF]. Also available: [ePrint archive]
Matthew Franklin and Haibin Zhang.
The Security of Ciphertext Stealing. [PDF]
Phillip Rogaway, Mark Wooding, and Haibin Zhang.
FSE 2012, LNCS 7549, pages 180-195, 2012.
Unique Group Signatures. [PDF] [Full Paper]. Also available: [ePrint archive]
Matthew Franklin and Haibin Zhang.
ESORICS 2012, LNCS 7459, pages 643-660, 2012.
Length-Doubling Ciphers and Tweakable Ciphers. [PDF]
Haibin Zhang.
ACNS 2012, LNCS 7341, pages 100-116, 2012.
Online Ciphers from Tweakable Blockciphers. [PDF]
Phillip Rogaway and Haibin Zhang.
CT-RSA 2011, LNCS 6558, pages 237-249, 2011.
Patents
SYSTEMS AND METHODS FOR SECURING DATA AT THIRD-PARTY STORAGE SERVICES.
Patent No. 9258122, Symantec Corporation, USA, 2014.
Haibin Zhang, Scott Schneider, Walter Bogorad, and Sharada Sundaram.
SYSTEMS AND METHODS FOR MAINTAINING ENCRYPTED SEARCH INDEXES ON THIRD-PARTY STORAGE SYSTEMS.
Application No. 14199240, Symantec Corporation, USA, 2014.
Haibin Zhang, Scott Schneider, Walter Bogorad, and Sharada Sundaram.
SYSTEMS AND METHODS FOR SEARCHING SHARED ENCRYPTED FILES ON THIRD-PARTY STORAGE SYSTEMS.
Patent No. 9342705, Symantec Corporation, USA, 2014.
Scott Schneider, Walter Bogorad, Haibin Zhang, and Sharada Sundaram.