What I’m Working On: Wang Mingyuan on Cryptography

Nov 13 2024

Wang Mingyuan studied mathematics until he discovered cryptography at graduate school at Purdue University. Coached by some of the world’s top minds in the field, Wang made cryptography a lifetime academic pursuit. This fall he joined NYU Shanghai as an assistant professor of Computer Science.

What is cryptography? And why did you choose this as your research area?

The main tasks of cryptography are to protect data privacy and verify authenticity. Cryptography involves a lot of mathematical tools to deal with practical problems in the field. As I continue to explore cryptography, I realized that it’s really cool. So I started doing a few projects with my advisor Hemanta K. Maji at Purdue University, and later became the first group of students of his that studied theoretical cryptography.

What are some of the applications of cryptography in real life?

Cryptography has wide-ranging applications in any field that prioritizes user data privacy. For instance, in the medical sector, if two hospitals collaborate to investigate the relationship between lung cancer and smoking, they must share sensitive patient data. Using secure multi-party computation, they can analyze this data without compromising patient privacy.

Another critical application is in account asset security, where we use threshold encryption to enhance protection by distributing multiple keys. However, while more key holders can complicate unauthorized access, having too many can slow down the decryption process. My research focuses on finding efficient ways to balance security and convenience in these systems.

The rise of generative AI adds complexity to information security. AI-generated content can be nearly indistinguishable from human-produced work. For example, certain manipulated images of public figures have circulated online without clear indicators of their origin. To address this, we can embed digital watermarks in AI-generated texts, allowing us to trace their source. However, current watermarking techniques often require lengthy sequences of text, which can hinder the performance of AI models like ChatGPT. My goal is to enhance these watermarking methods for better efficiency and effectiveness.

Tell us more about your research.

My research encompasses several key areas: threshold cryptography, secure multi-party computation, leakage-resilient cryptography, and applications of cryptography in machine learning. The core objective of threshold cryptography is to improve system robustness by distributing cryptographic keys among multiple parties.

Secure multi-party computation originated from the “Yao’s Millionaire Problem” introduced by Chinese computer scientist Andrew Chi-Chih Yao in 1982, which poses the question of how two millionaires can determine who is wealthier without revealing their actual wealth. This field explores how cryptographic methods can enable computing tasks without exposing participants' data. We create models that allow both parties to input their respective wealth and compute results accurately while keeping their data confidential.

Additionally, preventing data leakage is essential in safeguarding information security. Even seemingly trivial details, such as the running time of an encryption program, can serve as vulnerabilities. Effective encryption transforms plaintext (non-encrypted text) into ciphertext (encrypted text) using robust algorithms and keys, ensuring that unauthorized access and data breaches are prevented.

wangmingyuan
From left: Assistant Professor of Computer Science Wang Mingyuan, Assistant Professor at Purdue University Aarushi Goel, PhD student at University of California, Berkeley Guru-Vamsi Policharla, and Research Scientist at Nexus Arka Rai Choudhuri participated in the CRYPTO 2024 in Santa Barbara.



What made you want to join NYU Shanghai?

I like working with students. The student body of NYU Shanghai is very diverse. Students are very active — they often come to ask me questions after class. I like that. Working with them reminds me of the way I worked with my advisors. We can pick up a pen and discuss any problems anytime.

Another reason is that universities across China are full of talented researchers. And the city of Shanghai is at the forefront of the development of cryptography research. I’ve wanted to connect with researchers in the area and collaborate with them. Now, I am finally here and am looking forward to that.

What are you looking forward to doing at NYU Shanghai?

Teaching wise, I’m keen to share my knowledge on cryptography with students. We’re in the process of offering a cryptography course each semester. I hope more students get to explore this field and become interested in it.

Our research aims to develop security systems that withstand adaptive corruption threats, moving beyond traditional static security models. We want to enhance the resilience of cryptographic protocols in dynamic environments, where adversaries can take advantage of weaknesses in real-time.

Do you have any tips for students on doing research?

First of all, don’t let math scare you away. In conversations with my students, I’ve noticed that whenever we mention a paper, before even reading it, they get discouraged just by seeing the content. However, once they read it, they realize it’s not that difficult to understand. Generally speaking, as long as you know algebra, you can read many papers in the field of cryptography.

Next, it’s important to learn through application rather than just studying for the sake of studying. A mathematician once said something like, “even mathematicians don’t want to learn new mathematics.” They only seek new knowledge when they encounter problems they can’t solve. So, if you want to master a skill, the best way is to dive into practical projects and learn through real-world experience.

Finally, I want to emphasize the importance of asking bold questions. When you start to think about subtle aspects, those points that seem unrelated to your research or studies can connect through your questions and the discussions that follow. This process can be very helpful for deepening your understanding of the material.