Synchrony Fellowships

The Fall 2025 Synchrony Fellowship is now closed.

Congratulations to our awarded candidates!

Meet Our Awarded Synchrony Fellowships For Spring 2025

What practical impact will your research eventually have?

The practical impact of my research on satellite-based Quantum Key Distribution (QKD) will be significant for enhancing secure communication networks, especially over long distances. By developing a robust satellite scheduling algorithm, my research aims to optimize the use of satellite resources for efficient and fair key distribution among ground stations. This will ensure that sensitive information can be transmitted securely between distant locations without favoring any single user or region.
In practical terms, this research will strengthen data security across critical sectors, including government, defense, finance, and healthcare, by enabling reliable, quantum-secured communication infrastructure. Additionally, the fairness-focused scheduling model I’m developing will support widespread adoption of QKD by reducing latency, minimizing resource conflicts, and ensuring equitable access to secure communication channels worldwide. Ultimately, the outcomes of this research could help lay the groundwork for an international quantum-secured network, providing a higher standard of privacy and resilience against cyber threats.

What do you think is the most pressing need for improving cybersecurity?

The most pressing need for improving cybersecurity, specifically addressed by my research, is developing an efficient and fair satellite scheduling algorithm for Quantum Key Distribution (QKD) systems. As quantum technology advances, secure, long-distance key distribution will be critical to protecting sensitive communications, especially over vast geographic distances where direct fiber connections are impractical.
My research tackles a core challenge: ensuring that satellite resources are used effectively and equitably, allowing ground stations to receive their cryptographic keys promptly without any one location monopolizing resources. By designing a scheduling system that maximizes resource utilization and minimizes wait times, we can create a more reliable and scalable QKD network. This will be foundational for establishing secure, quantum-safe communication channels on a global scale, which is essential for critical sectors such as finance, defense, and healthcare, ultimately raising the standard for cybersecurity in the quantum era.

Md. Zakir Hossain

My research (CTng) aims to create a practical and secure Public Key Infrastructure (PKI) that builds on the current Certificate Transparency (CT) ecosystem. By extending CT with a decentralized trust model and adding Byzantine fault tolerance, my work ensures that the system stays secure and reliable even if some parts fail or act maliciously. This approach addresses a key need in cybersecurity: reducing reliance on centralized trust, which can lead to single points of failure and increased vulnerability. By spreading trust across multiple entities, my research improves the security and resilience of PKI, helping create a safer digital environment.

Jie Kong

What practical impact will your research eventually have?

Our project aims to secure user’s location data in cellular network performance measurements by using Local Differential Privacy (LDP). LDP perturbs location data on the device before transmission, so real locations remain private, even if the server is compromised.  Additionally, machine learning techniques are employed to accurately estimate network performance from the perturbed data. By balancing privacy and measurement accuracy, network providers can gather the metrics they need to improve network quality without exposing user information, making cellular network measurements safer for users.

What do you think is the most pressing need for improving cybersecurity?

One pressing need in cybersecurity is to develop privacy-preserving data analysis frameworks. Many applications need high-quality data for accurate analytics but face constraints around user privacy, which makes LDP particularly promising. Integrating machine learning methods that work effectively within the LDP framework is essential to ensure that data remains useful while protecting user privacy.

Yawen Deng

Deng, Yawen Headshot

What practical impact will your research eventually have?

Our research on characterizing the security region of the GHOST protocol could have a significant impact on blockchain security, particularly in protocols like Ethereum that utilize GHOST. By establishing precise security boundaries under different tiebreaking rules, our work may guide protocol developers on whether and how GHOST can be safely deployed in environments with variable network conditions or adversarial presence. Insights from our study could contribute to making blockchains more resilient to attacks and encourage the adoption of tiebreaking mechanisms that enhance protocol security.

What do you think is the most pressing need for improving cybersecurity?

In blockchain, one pressing need is the development of consensus protocols that are both secure under a variety of adversarial conditions and adaptable to real-world network delays. As decentralized systems become more mainstream, the capability to maintain security without requiring perfect synchronization among nodes is critical. More generally, addressing security in distributed systems requires tools to handle adversarial behaviors, especially in network delays and block production, to ensure robust, secure operation even in the presence of potential protocol vulnerabilities.

Zahra Motaqy

What practical impact will your research eventually have?

Private Information Retrieval (PIR) enables users to access specific data from a server without disclosing what data they access. In healthcare, PIR lets doctors query sensitive medical records without revealing the precise information accessed. In advertising, companies can deliver targeted ads without knowing which user-specific data points drive the recommendations. My research aims to make PIR scalable for real-world applications, where large data volumes are common, while ensuring efficiency comparable to non-private systems.

What do you think is the most pressing need for improving cybersecurity?

In terms of Private Information Retrieval (PIR), there remains a significant gap between its potential and scalability. Most protocols are not yet efficient enough to compare with non-private real-world systems. I believe our primary goal should be to make secure systems as efficient as possible through ongoing research to ensure a seamless user experience. This would make secure systems—whether they provide secure computation or private information retrieval—the preferred choice for most daily tasks in the future.

Ali Arastehfard

Arastehfard, Ali Headshot

Fall 2024 Awards

Spring 2025 Awards

Fall 2025 Awards