Profile Image

Hanwen Feng

Senior Lecturer (~ US Assoc. Prof.)

CSSE Department

University of Canterbury

About Me

I am a researcher and academic specializing in cryptography, distributed computing, and computer security. I will be joining the Department of Computer Science and Software Engineering (CSSE) at the University of Canterbury in Semester 2, 2026.

Most recently, I was a postdoc at University of Sydney (2022.10-2026.2), hosted by Prof. Qiang Tang. Prior to that, I worked as a Senior Security Engineer at Alibaba Group . I earned both my Ph.D. and undergraduate degree from Beihang University, which included a visiting research period at the New Jersey Institute of Technology .

Research Interest

My research focuses on the foundations and techniques of secure distributed protocols, alongside broader topics in cryptography. In recent years, my work has centered on the following topics:

Publications

  1. Õptimal Adaptively Secure Hash-based MVBA and Asynchronous Common Subset
    Hanwen Feng, Zhenliang Lu, Qiang Tang.
    Annual International Cryptology Conference (CRYPTO), 2026 (To Appear).
    [ePrint]
  2. Anchor-DKG: Distributed Key Generation with Repeating Parties
    Hanwen Feng, Qiang Tang, and Sri AravindaKrishnan Thyagarajan.
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2026 (To Appear).
    [ePrint]
  3. Balanced and Adaptively Secure Asynchronous Common Coin and Byzantine Agreement With Subquadratic Communication
    Hanwen Feng, Tiancheng Mai, Qiang Tang.
    ACM Symposium on Principles of Distributed Computing (PODC), 2026 (To Appear).
    [ePrint]
  4. Practical Asynchronous Distributed Key Reconfiguration and Its Applications
    Hanwen Feng, Yingzi Gao, Yuan Lu, Qiang Tang, Jing Xu.
    IEEE Symposium on Security and Privacy (S&P), 2026 (To Appear).
    [ePrint]
  5. Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Entropy
    Hanwen Feng, Qiang Tang.
    Journal version: Journal of Cryptology (JoC), 2026.
    Conference version: Theory of Cryptography Conference (TCC), 2021.
    [ePrint] | [JoC DOI] | [TCC DOI]
  6. Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup
    Hanwen Feng, Qiang Tang.
    Annual International Cryptology Conference (CRYPTO), 2025.
    [ePrint] | [DOI]
  7. Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement
    Hanwen Feng, Zhenliang Lu, Tiancheng Mai, Qiang Tang.
    Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2025.
    🏆 Best Paper Award (Top 3 Papers)
    [ePrint] | [DOI]
  8. Optimal Byzantine Agreement in the Presence of Message Drops
    Hanwen Feng, Zhenliang Lu, Qiang Tang, Yuchen Ye.
    International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2025.
    [ePrint] | [DOI]
  9. Dragon: Decentralization at the cost of Representation after Arbitrary Grouping and Its Applications to Sub-cubic DKG and Interactive Consistency
    Hanwen Feng, Zhenliang Lu, Qiang Tang.
    ACM Symposium on Principles of Distributed Computing (PODC), 2024.
    [ePrint] | [DOI]
  10. Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
    Hanwen Feng, Tiancheng Mai, Qiang Tang.
    ACM Conference on Computer and Communications Security (CCS), 2024.
    [ePrint] | [DOI]
  11. Privacy Enhancements via Dummy Points in the Shuffle Model
    Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Jinfei Liu, Kui Ren, Zhan Qin.
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024.
    [ePrint] | [DOI]
  12. OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization
    Xiaochen Li, Yuke Hu, Weiran Liu, Hanwen Feng, Li Peng, Hong Yuan, Kui Ren, Zhan Qin.
    International Conference on Very Large Data Bases (VLDB), 2023.
    [ePrint] | [DOI]
  13. Scape: Scalable Collaborative Analytics System on Private Database with Malicious Security
    Han Feng, Lan Zhang, Hanwen Feng, Weiran Liu, Xiangyang Li.
    International Conference on Data Engineering (ICDE), 2022.
    [ePrint] | [DOI]
  14. Witness Authenticating NIZKs and Applications
    Hanwen Feng, Qiang Tang.
    Annual International Cryptology Conference (CRYPTO), 2021.
    [ePrint] | [DOI]
  15. Traceable Ring Signatures: General Framework and Post-quantum Security
    Hanwen Feng, Jianwei Liu, Dawei Li, Ya-Nan Li, Qianhong Wu.
    Journal version: Designs, Codes and Cryptography (DCC), 2021.
    Conference version: Cryptographer's Track at RSA Conference (CT-RSA), 2020.
    [PDF] | [DCC DOI] | [CT-RSA DOI]
  16. Secure Stern Signatures in Quantum Random Oracle Model
    Hanwen Feng, Jianwei Liu, Qianhong Wu.
    Information Security Conference (ISC), 2019.
    [PDF] | [DOI]
  17. Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
    Hanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu.
    International Conference on Information Security and Cryptology (INSCRYPT), 2017.
    [DOI]

Services

Conference Program Committee

Journal Reviewers

  • IEEE Transactions on Secure and Dependable Computing
  • IEEE Transactions on Information Forensics and Security
  • IEEE Transactions on Knowledge and Data Engineering
  • ACM Transactions on Recommender Systems
  • The Computer Journal
  • IEEE Network Magazine
  • Information Sciences
  • IET Information Security

Awards

  • 2025: Top Reviewer Award of CCS 2025
  • 2025: Best Paper Award of DSN 2025
  • 2022: Excellent Doctoral Dissertation Award of Beihang University
  • 2022: Best Paper Award from Journal of Cryptologic Research
  • 2019: National Scholarship from China Ministry of Education