Ye Dong (董业)
Research Fellow, Secure & Private AI
National University of Singapore (NUS)
Ph.D. in Cyberspace Security
dong_ye_@outlook.com
Education
  • University of Chinese Academy of Sciences (UCAS)
    University of Chinese Academy of Sciences (UCAS)
    Sep. 2018 – Jun. 2023
    Ph.D. in Cyberspace Security
    Beijing, China
    Institute of Information Engineering, Chinese Academy of Sciences (IIE, CAS)
  • Shandong University
    Shandong University
    Sep. 2014 – Jun. 2018
    B.Eng. in Computer Science and Technology
    Jinan, China
  • Experience
  • National University of Singapore
    National University of Singapore
    Jan. 2025 – Present
    Research Fellow, Secure & Private AI
    Singapore
  • Singapore University of Technology and Design
    Singapore University of Technology and Design
    Jan. 2024 – Jan. 2025
    Research Fellow, IoT Security
    Singapore
  • Peking University
    Peking University
    Aug. 2023 – Oct. 2023
    Research Assistant, Private LLMs
    Singapore
    Hosted by Prof. Meng Li
  • Ant Research
    Ant Research
    Apr. 2023 – Jul. 2023
    Research Intern, Practical Cryptographic Techniques
    Beijing, China
    Hosted by Dr. Cheng Hong
  • Honors & Awards
  • Outstanding Ph.D. Graduate Award
    Oct. 2023
  • CAS Presidential Scholarship (Excellent Prize)
    Jun. 2023
  • About Me

    I am a Research Fellow at the School of Computing, National University of Singapore (NUS), hosted by Prof. Jin-Song Dong, and work closely with Prof. Tianwei Zhang from NTU. I received my Ph.D. in Cyberspace Security from the Institute of Information Engineering, Chinese Academy of Sciences (IIE, CAS) and the University of Chinese Academy of Sciences (UCAS), and my B.Eng. in Computer Science and Technologyfrom Shandong University.

    My research focuses on practical cryptographic systems for secure and private AI, including secure multi-party computation, privacy-preserving machine learning, secure large language model inference, and system optimization. My work has been published in top-tier venues, including USENIX Security, ESORICS, ACSAC, PoPETs, ACNS, WWW, ICLR, NeurIPS, CVPR, DAC, IEEE TIFS and TDSC.

    Research Interests: - Applied Cryptography - Secure Multi-Party Computation - Privacy-Preserving Machine Learning - Large Language Models - System & GPU Acceleration

    I am interested in building practical and deployable privacy-enhancing technologies and actively collaborate with both academia and industry.
    I am on the academic job market for faculty positions in 2026. Please contact me if there are potential openings.
    News
    2026
    Invited as Guest Editor for Sepcial Issue: Emerging Techniques for Privacy, Security and Trusted Execution in IoT Systems of Journal Information.
    Jan 27
    Invited as TPC for CSDP 2026.
    Jan 27
    One paper on Private LLM Prompt Tuning accepted by ICLR 2026.
    Jan 26
    Invited as Reviewer for ECCV 2026.
    Jan 24
    Invited Talk by Prof. Marten van Dijk & Chao Yin of CWI on FLock (WWW'25). More
    Jan 20
    One paper on Private LLM Watermarking accepted by IEEE ICC 2026.
    Jan 19
    2025
    One survey on Cryptography-based Private Large Langaue Models accepted by Artificial Intelligence Review 2025.
    Dec 26
    One paper on Three-Party Boolean Circuits accepted by IEEE TIFS 2025.
    Dec 21
    One paper on Streaming Function Secret Sharing accepted by USENIX Security 2026.
    Dec 20
    One paper on Two-Party Secure Machine Learning accepted by IEEE TDSC 2025.
    Dec 09
    Attending ACSAC 2025 at Honolulu, Hawaii. More
    Dec 08
    Paper PUMA accepted by Security & Safety 2025.
    Oct 16
    One paper on Private LLM with KV Cache accepted by NeurIPS 2025.
    Sep 19
    One paper on GPU-accelerated 3-party Secure Deep Learning accepted by ACSAC 2025.
    Sep 13
    Joined School of Computing, National University of Singapore as a Research Fellow. Featured
    Jan 20
    2024
    Attending ACM ASIACCS 2024 as an Volunteer. read more
    Jul 01
    Jan 20
    2023
    Joined School of Artificial Intelligence of PKU as a Research Assistant.
    Aug 01
    Successfully defend the Ph.D. degree in Cyberspace Security from the Institute of Information Engineering, Chinese Academy of Sciences! Featured
    Jun 01
    Joined Ant Cryptography & Privacy Lab (Ant CP Lab) as a Research Intern.
    Apr 01
    Research Highlights
    * Equal contribution, Corresponding author
    Streaming Function Secret Sharing and Its Applications
    Streaming Function Secret Sharing and Its Applications

    Xiangfu Song, Jianli Bai, Ye Dong, Yijia Liu, Yu Zhang, Xianhui Lu, Tianwei Zhang

    USENIX Security Symposium 2026

    CCF-A CORE-A*

    We introduce a new cryptographic primitive called streaming function secret sharing (SFSS), a new variant of FSS that is particularly suitable for secure computation over streaming messages. We formalize SFSS and propose concrete constructions, including SFSS for point functions, predicate functions, and feasibility results for generic functions. SFSS powers several promising applications in a simple and modular fashion, including conditional transciphering, policy-hiding aggregation, and attribute-hiding aggregation. In particular, our SFSS formalization and constructions identify security flaws and efficiency bottlenecks in existing solutions, and SFSS-powered solutions achieve the expected security goal with asymptotically and concretely better efficiency and/or enhanced functionality.

    # secure multi-party computation # applied cryptography # streaming data aggregation

    Streaming Function Secret Sharing and Its Applications

    Xiangfu Song, Jianli Bai, Ye Dong, Yijia Liu, Yu Zhang, Xianhui Lu, Tianwei Zhang

    USENIX Security Symposium 2026 CCF-A CORE-A*

    We introduce a new cryptographic primitive called streaming function secret sharing (SFSS), a new variant of FSS that is particularly suitable for secure computation over streaming messages. We formalize SFSS and propose concrete constructions, including SFSS for point functions, predicate functions, and feasibility results for generic functions. SFSS powers several promising applications in a simple and modular fashion, including conditional transciphering, policy-hiding aggregation, and attribute-hiding aggregation. In particular, our SFSS formalization and constructions identify security flaws and efficiency bottlenecks in existing solutions, and SFSS-powered solutions achieve the expected security goal with asymptotically and concretely better efficiency and/or enhanced functionality.

    ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy
    ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy

    Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong

    IEEE Transactions on Information Forensics and Security 2025

    CCF-A CORE-A

    We propose a round-efficient 3PC framework ALKAID for Boolean circuits through improved multi-input AND gate. By mixing correlations and redundancy, we propose a concretely efficient correlation generation approach for small input bits $N\le 4$ and shift the correlation generation to the preprocessing phase. Building on this, we create a round-efficient AND protocol for general cases with $N>4$. Exploiting the improved multi-input AND gates, we design fast depth-optimized parallel prefix adder and share conversion primitives in 3PC, achieved with new techniques and optimizations for better concrete efficiency. We further apply these optimized primitives to enhance the efficiency of secure non-linear functions in machine learning.

    # secure multi-party computation # applied cryptography # boolean circuits # machine learning

    ALKAID: Accelerating Three-Party Boolean Circuits by Mixing Correlations and Redundancy

    Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Wen-jie Lu, Tianwei Zhang, Jianying Zhou, Jin-Song Dong

    IEEE Transactions on Information Forensics and Security 2025 CCF-A CORE-A

    We propose a round-efficient 3PC framework ALKAID for Boolean circuits through improved multi-input AND gate. By mixing correlations and redundancy, we propose a concretely efficient correlation generation approach for small input bits $N\le 4$ and shift the correlation generation to the preprocessing phase. Building on this, we create a round-efficient AND protocol for general cases with $N>4$. Exploiting the improved multi-input AND gates, we design fast depth-optimized parallel prefix adder and share conversion primitives in 3PC, achieved with new techniques and optimizations for better concrete efficiency. We further apply these optimized primitives to enhance the efficiency of secure non-linear functions in machine learning.

    M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols
    M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols

    Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, Jian Liu

    IEEE Transactions on Dependable and Secure Computing 2025

    CCF-A CORE-A

    M&M features an efficient modulus conversion protocol. This breakthrough enables seamless integration of the most suitable cryptographic subprotocols within their optimal modulus domains, allowing linear computations to be executed over a prime modulus and nonlinear computations over a two-power modulus, with a minimal modulus conversion overhead. We further establish new benchmarks for the performance of fundamental primitives, namely comparison and multiplication, across various two-party techniques, together with our practical optimizations to improve efficiency.

    # secure multi-party computation # applied cryptography # machine learning # homomorphic encryption

    M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols

    Ye Dong, Wen-jie Lu, Xiaoyang Hou, Kang Yang, Jian Liu

    IEEE Transactions on Dependable and Secure Computing 2025 CCF-A CORE-A

    M&M features an efficient modulus conversion protocol. This breakthrough enables seamless integration of the most suitable cryptographic subprotocols within their optimal modulus domains, allowing linear computations to be executed over a prime modulus and nonlinear computations over a two-power modulus, with a minimal modulus conversion overhead. We further establish new benchmarks for the performance of fundamental primitives, namely comparison and multiplication, across various two-party techniques, together with our practical optimizations to improve efficiency.

    All Research