Grants per year
Personal profile
Research Interests
Computer security, privacy, and cryptography.
Education/Academic qualification
Computer Science, BE, Hong Kong University of Science and Technology
Computer Science, PhD, University of Maryland, College Park
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
CNS Core: Medium: Privacy‐Preserving and Censorship‐Resistant Domain Name System
Kuzmanovic, A. (PD/PI) & Wang, X. (Co-Investigator)
10/1/23 → 9/30/26
Project: Research project
-
Collaborative Research: FMitF: Track I: Automating and Synthesizing Parallel Zero‐Knowledge Protocols
Wang, X. (PD/PI)
10/1/23 → 9/30/27
Project: Research project
-
CAREER: Pushing the Practicality of Secure Multiparty Computation
Wang, X. (PD/PI)
4/1/23 → 3/31/28
Project: Research project
-
Bringing Auditability to Privacy-Preserving Electronic Health Record Aggregation using Zero-Knowledge Proofs
Kho, A. N. (PD/PI), Kho, A. N. (PD/PI), Kho, A. N. (PD/PI), Rogers, J. M. (Co-Investigator), Rogers, J. M. (Co-Investigator), Wang, X. (Co-Investigator) & Wang, X. (Co-Investigator)
Stealth Software Technologies, Inc., Defense Advanced Research Projects Agency (DARPA)
1/31/23 → 10/31/24
Project: Research project
-
Collaborative Research: SaTC: CORE: Medium: Quicksilver: a Write-oriented, Private, Outsourced Database Management System
Rogers, J. M. (PD/PI), Rogers, J. M. (PD/PI), Rogers, J. M. (PD/PI), Wang, X. (Co-PD/PI), Wang, X. (Co-PD/PI) & Wang, X. (Co-PD/PI)
10/1/20 → 9/30/25
Project: Research project
-
Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks
Cui, H., Wang, X., Yang, K. & Yu, Y., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 35-67 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14005 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Scopus citations -
Efficient and Secure Quantile Aggregation of Private Data Streams
Lan, X., Jin, H., Guo, H. & Wang, X., 2023, In: IEEE Transactions on Information Forensics and Security. 18, p. 3058-3073 16 p.Research output: Contribution to journal › Article › peer-review
-
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off
Kolesnikov, V., Peceny, S., Trieu, N. & Wang, X., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 439-457 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
Guo, X., Yang, K., Wang, X., Zhang, W., Xie, X., Zhang, J. & Liu, Z., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 330-362 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Scopus citations -
Ou: Automating the Parallelization of Zero-Knowledge Protocols
Sang, Y., Luo, N., Judson, S., Chaimberg, B., Antonopoulos, T., Wang, X., Piskac, R. & Shao, Z., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 534-548 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access1 Scopus citations