About Me

I’m an Assistant Professor of Computer Science at Yale University. My research spans computer security and applied cryptography, with a focus on building trustworthy systems through decentralization, verifiability, and accountability.

My work has been deployed by Chainlink, Oasis Labs, Flashbots, and others. I initiated what is now known as zkTLS β€” my protocols are implemented by numerous projects including Reclaim, zkPass, and TLSNotary.

Research interests
  • Cryptography for decentralization, verifiability, and accountability
  • Economic security with rational players
  • Decentralized finance, identity, and AI applications
Working with me
I always look for motivated students and researchers (interns, Yale undergraduates, PhD applicants, and postdocs). More details β†’

Updates

πŸ“Œ
DECO, the first zkTLS protocol we devised in 2019, is now in Chainlink’s Platform Privacy Suite.
Apr '26
Two papers accepted to present at Designing DeFi (DΒ²).
Apr '26
Mar '26
VAR (ePrint 2025/2330) is presented at Northeastern Security Day (NESD).
Feb '26
Cirrus: Performant and Accountable Distributed SNARK (NDSS'26) is presented at NDSS'26!
Aug '25
Received a collaborative NSF award to work on TEE powered Confidential Genome Imputation and Analytics.
Aug '25
Recent talks: IC3 Blockchain Camp, NoConsensus@SBC25, and ETH NYC'25.
Apr '25
New paper Insecurity Through Obscurity: Veiled Vulnerabilities in Closed-Source Contracts is online. Also check out the nice highlight by EigenPhi.

Recent Projects

A unifying theme of my research is building trustworthy computer systems through three approaches: (1) decentralization, which enables programs to run on consensus networks without a trusted operator; (2) confidential and verifiable computation, which uses cryptographic proofs or trusted hardware to let users verify correct execution or protect private inputs; and (3) accountability, which gives users evidence of misbehavior. We develop foundational building blocks with the goal of enabling real-world applications in finance, identity, social media, and AI.

User Engagement Auditing

When payments are tied to volume β€” content promotion billed by reach, healthcare services reimbursed per patient β€” clients must trust the platform’s self-reported numbers. VAR introduces a cryptographic primitive that fixes this: the paying party can verify the count of users served without learning individual identities. We demonstrate it with TrueReach, a system for verifiable content promotion on Bluesky.

Distributed SNARKs and Proof Markets

Generating ZK proofs for large-scale computations is computationally expensive. Distributing the work across many provers achieves near-linear speedup. We also study pricing and fair allocation of prover work in open markets.

MEV: Measurement and Mitigation

MEV arises when block producers reorder, insert, or censor transactions for profit, harming user fairness and creating centralization incentives. We measure these effects empirically and work on mitigations.

Censorship in Blockchains

Censorship occurs when block producers deliberately exclude transactions β€” motivated by bribes, regulatory pressure, or competitive advantage. We study mitigations including inclusion lists and multi-proposer BFT protocols.

Anonymity in Network and Consensus

Open networks expose participants to traffic analysis and deanonymization. We build anonymity primitives for decentralized systems: ZIPNet, a DC-net protocol for anonymous broadcast (implemented by Flashbots), and Qelect, the first post-quantum SSLE protocol that hides block proposer identities in consensus.

Data Liberation, Provenance and Applications

Town Crier and DECO were among the first to establish verifiable provenance of TLS-encrypted web data β€” turning any HTTPS site into a source of verifiable claims β€” initiating the zkTLS area, with protocols now deployed by Chainlink and numerous startups.

Reducing Trust in TEEs

TEEs offer strong confidentiality and integrity but are vulnerable to side channels. We design systems that tolerate, detect, or economically disincentivize leakage.

The above covers recent projects; for a complete list seeall publications β†’