Xiao Wang

  • 470 Citations
20142019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2014 2019

  • 470 Citations
  • 17 Conference contribution
  • 1 Article
Filter
Conference contribution
2019
1 Citation (Scopus)

Covert security with public verifiability: faster, leaner, and simpler

Hong, C., Katz, J., Kolesnikov, V., Lu, W. J. & Wang, X., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 97-121 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Certificate
Oblivious Transfer
Signed
Time Constant

Scalable Private Set Union from Symmetric-Key Techniques

Kolesnikov, V., Rosulek, M., Trieu, N. & Wang, X., Jan 1 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 636-666 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Union
Network security
Experiments
Reverse
Thread
2018
12 Citations (Scopus)

Improved non-interactive zero knowledge with applications to post-quantum signatures

Katz, J., Kolesnikov, V. & Wang, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 525-537 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Network protocols
6 Citations (Scopus)

Optimizing authenticated garbling for faster secure two-party computation

Katz, J., Ranellucci, S., Rosulek, M. & Wang, X., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 365-391 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimization
Communication
Secure Computation
Preprocessing
Concretes
4 Citations (Scopus)

Secure computation with low communication from cross-checking

Dov Gordon, S., Ranellucci, S. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 59-85 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Communication
Boolean Circuits
Ring
Leakage

Simple and efficient two-server ORAM

Dov Gordon, S., Katz, J. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage
Servers
Server
Private Information Retrieval
Secure Computation
2017
30 Citations (Scopus)

Authenticated garbling and efficient maliciously secure two-party computation

Wang, X., Ranellucci, S. & Katz, J., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 21-37 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
18 Citations (Scopus)

Faster secure two-party computation in the single-execution setting

Wang, X., Malozemoff, A. J. & Katz, J., Jan 1 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 399-424 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Secure Computation
Public key
Networks (circuits)
Output
31 Citations (Scopus)

Global-scale secure multiparty computation

Wang, X., Ranellucci, S. & Katz, J., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 39-56 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Information use
2016
24 Citations (Scopus)

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation

Zahur, S., Wang, X., Raykova, M., Gascon, A., Doerner, J., Evans, D. & Katz, J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 218-234 17 p. 7546504. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage
Data storage equipment
Costs
Servers
7 Citations (Scopus)

Secure computation of MIPS machine code

Wang, X., Gordon, S. D., McIntosh, A. & Katz, J., Jan 1 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 99-117 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Networks (circuits)
Random access storage
Program processors
Express
2015
42 Citations (Scopus)

Circuit ORAM: On tightness of the Goldreich-Ostrovsky

Wang, X., Chan, T. H. H. & Shi, E., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 850-861 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
48 Citations (Scopus)

Efficient genome-wide, privacy-preserving Similar Patient Query based on private edit distance

Wang, X., Huang, Y., Zhao, Y., Tang, H., Wang, X. F. & Bu, D., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Genes
Approximation algorithms
Nucleotides
47 Citations (Scopus)

GraphSC: Parallel secure computation made easy

Nayak, K., Wang, X., Ioannidis, S., Weinsberg, U., Taft, N. & Shi, E., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 377-394 18 p. 7163037. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Parallel programming
Factorization
Learning algorithms
Data mining
Learning systems
98 Citations (Scopus)

ObliVM: A programming framework for secure computation

Liu, C., Wang, X., Nayak, K., Huang, Y. & Shi, E., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 359-376 18 p. 7163036. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer programming
Computer programming languages
Data mining
Data structures
Scalability
2014
37 Citations (Scopus)

Oblivious data structures

Wang, X., Nayak, K., Liu, C., Chan, T. H. H., Shi, E., Stefanov, E. & Huang, Y., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data structures
Data storage equipment
58 Citations (Scopus)

SCORAM: Oblivious RAM for secure computation

Wang, X., Huang, Y., Chan, T. H. H., Shelat, A. & Shi, E., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 191-202 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random access storage
Networks (circuits)
Asymptotic analysis
Bandwidth
Data storage equipment