Xiao Wang

  • 456 Citations
20142019
If you made any changes in Pure, your changes will be visible here soon.

Personal profile

Research Interests

Computer security, privacy, and cryptography.

Education/Academic qualification

Computer Science, BE, Hong Kong University of Science and Technology

Computer Science, PhD, University of Maryland, College Park

Fingerprint Dive into the research topics where Xiao Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 8 Similar Profiles
Secure Computation Mathematics
Random access storage Engineering & Materials Science
Networks (circuits) Engineering & Materials Science
Network protocols Engineering & Materials Science
Communication Engineering & Materials Science
Data structures Engineering & Materials Science
Privacy Preserving Mathematics
Servers Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2014 2019

  • 456 Citations
  • 16 Conference contribution
  • 1 Article
1 Citation (Scopus)

Covert security with public verifiability: faster, leaner, and simpler

Hong, C., Katz, J., Kolesnikov, V., Lu, W. J. & Wang, X., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 97-121 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Certificate
Oblivious Transfer
Signed
Time Constant
11 Citations (Scopus)

Improved non-interactive zero knowledge with applications to post-quantum signatures

Katz, J., Kolesnikov, V. & Wang, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 525-537 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Network protocols
6 Citations (Scopus)

Optimizing authenticated garbling for faster secure two-party computation

Katz, J., Ranellucci, S., Rosulek, M. & Wang, X., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 365-391 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimization
Communication
Secure Computation
Preprocessing
Concretes
4 Citations (Scopus)

Secure computation with low communication from cross-checking

Dov Gordon, S., Ranellucci, S. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 59-85 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Communication
Boolean Circuits
Ring
Leakage

Simple and efficient two-server ORAM

Dov Gordon, S., Katz, J. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage
Servers
Server
Private Information Retrieval
Secure Computation