Hi! Welcome to my homepage!

I am currently a postdoctoral researcher at the School of Computer Science, University of Sydney, hosted by Dr. Qiang Tang. Prior to joining USYD, I worked as a senior security engineer at Alibaba Group (2021-2022) and completed my PhD at Beihang University (2017-2021), with a visiting period at the New Jersey Institute of Technology (2019-2020).

Here is my CV. I am currently on the job market for academic positions.

Research | Service | Award | Misc

Research Interests and Outcomes

I have a broad spectrum of interests in cryptography and computer security, with a recent focus on cryptography and consensus challenges in distributed systems.

DKG | Consensus | Accountability | Privacy-preserving Computation

Distributed Key and Randomness Generation

A secret’s birth that none alone can hold.

  • [PODC’24] Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency (link)
    ACM Symposium on Principles of Distributed Computing (A* Conference)
    Hanwen Feng, Zhenliang Lu, Qiang Tang

  • [CCS’24] Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing (link)
    ACM Conference on Computer and Communications Security (A* Conference)
    Hanwen Feng, Tiancheng Mai, Qiang Tang

  • [Preprint] Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup (link)
    Hanwen Feng, Qiang Tang

  • [Preprint] Practical Asynchronous Distributed Key Reconfiguration and Its Applications (link)
    Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu

  • [Manuscript] Circular Dragon: ˜Optimal Adaptively Secure Distributed Key and Randomness Generation
    Hanwen Feng, Yuan Lu, Tiancheng Mai, Qiang Tang

Byzantine Consensus

Through whispers false and voices loud, consensus rises strong and proud.

  • [DSN’25] Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement (link) Annual IEEE/IFIP International Conference on Dependable Systems and Networks (A Conference) Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang

  • [Preprint] ˜Optimal Adaptively Secure Hash-based Asynchronous Common Subset (link)
    Hanwen Feng, Zhenliang Lu, Qiang Tang

  • [Manuscript] Optimal Byzantine Agreement in the Presence of Message Drops
    Hanwen Feng, Zhenliang Lu, Qiang Tang, Yuchen Ye

Authentication & Accountability

In each truth that a voice proclaims, accountability stands, and trust remains.

  • [CRYPTO’ 21] Witness Authenticating NIZKs and Applications (link)
    Annual International Cryptology Conference (A* Conference)
    Hanwen Feng, Qiang Tang

  • [TCC’ 21] Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Entropy (link)
    Theory of Cryptography Conference (A Conference)
    Journal of Cryptology (A* Journal, in Revision)
    Hanwen Feng, Qiang Tang

  • [DCC’ 21] Traceable Ring Signatures: General Framework and Post-quantum Security
    International Journal - Designs, Codes and Cryptography (B Journal)
    Hanwen Feng, Jianwei Liu, Dawei Li, Ya-Nan Li, Qianhong Wu

  • [CT-RSA’ 20] Traceable Ring Signatures with Post-quantum Security
    Cryptographer’s Track at RSA Conference (B Conference)
    Hanwen Feng, Jianwei Liu, Ya-Nan Li, Qianhong Wu

  • [ISC’ 19] Secure Stern Signatures in Quantum Random Oracle Model
    Information Security Conference (B Conference)
    Hanwen Feng, Jianwei Liu, Qianhong Wu

Privacy-preserving Computation

  • [VLDB’ 23] OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization (link)
    International Conference on Very Large Data Bases (A* Conference)
    Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Hong Yuan, Kui Ren, Zhan Qin

  • [ICDE’ 22] Scape: Scalable Collaborative Analytics System on Private Database with Malicious Security
    International Conference on Data Engineering (A* Conference)
    Han Feng, Lan Zhang, Hanwen Feng, Weiran Liu, Xiangyang Li

  • [IEEE TDSC’23]Privacy Enhancements via Dummy Points in the Shuffle Model
    {IEEE Transactions on Dependable and Secure Computing} (A Journal)
    Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Jinfei Liu, Kui Ren, Zhan Qin

  • [Preprint] PsiBench: Pragmatic Benchmark of Two-party Private Set Intersection (link)
    Ziyuan Liang, Weiran Liu, Hanwen Feng, Feng Han, Liqiang Peng, Li Peng, Chao Li, Guorui Xu, Lei Zhang, Fan Zhang

Services

Program Committees

Sub-reviewers

  • 2025: Oakland

  • 2024: Oakland, CRYPTO, Usenix Security, NDSS, Asiacrypt

  • 2023: Oakland, Eurocrypt, NDSS, Asiacrypt, AsiaCCS, AFT

Journal Reviewers

IEEE Transactions on Information Forensics and Security, IEEE Transactions on Dependable and Secure Computing, ACM Transactions on Recommender Systems, The Computer Journal, IEEE Network Magazine, Information Sciences, IET Information Security, etc.

Implementaions

I contributed to mpc4j, a Java-based secure multiparty computation library supported by Alibaba.

Awards & Honors

I received Excellent Doctoral Dissertation Award from Beihang University, Outstanding Graduate Student in Cyber Science scholarship from China Internet Development Foundation, National Scholarship from China MOE, etc.