Xiao Wang

  • 487 Citations
20142019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 487 Citations
  • 17 Conference contribution
  • 1 Article
Filter
Conference contribution
2014

Oblivious data structures

Wang, X., Nayak, K., Liu, C., Chan, T. H. H., Shi, E., Stefanov, E. & Huang, Y., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

40 Scopus citations

SCORAM: Oblivious RAM for secure computation

Wang, X., Huang, Y., Chan, T. H. H., Shelat, A. & Shi, E., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 191-202 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

59 Scopus citations
2015

Circuit ORAM: On tightness of the Goldreich-Ostrovsky

Wang, X., Chan, T. H. H. & Shi, E., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 850-861 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

46 Scopus citations

Efficient genome-wide, privacy-preserving Similar Patient Query based on private edit distance

Wang, X., Huang, Y., Zhao, Y., Tang, H., Wang, X. F. & Bu, D., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

48 Scopus citations

GraphSC: Parallel secure computation made easy

Nayak, K., Wang, X., Ioannidis, S., Weinsberg, U., Taft, N. & Shi, E., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 377-394 18 p. 7163037. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Scopus citations

ObliVM: A programming framework for secure computation

Liu, C., Wang, X., Nayak, K., Huang, Y. & Shi, E., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 359-376 18 p. 7163036. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

100 Scopus citations
2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation

Zahur, S., Wang, X., Raykova, M., Gascon, A., Doerner, J., Evans, D. & Katz, J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 218-234 17 p. 7546504. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Secure computation of MIPS machine code

Wang, X., Gordon, S. D., McIntosh, A. & Katz, J., Jan 1 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Katsikas, S., Meadows, C., Askoxylakis, I. & Ioannidis, S. (eds.). Springer Verlag, p. 99-117 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9879 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations
2017

Authenticated garbling and efficient maliciously secure two-party computation

Wang, X., Ranellucci, S. & Katz, J., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 21-37 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Faster secure two-party computation in the single-execution setting

Wang, X., Malozemoff, A. J. & Katz, J., Jan 1 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 399-424 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Global-scale secure multiparty computation

Wang, X., Ranellucci, S. & Katz, J., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 39-56 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Scopus citations
2018

Improved non-interactive zero knowledge with applications to post-quantum signatures

Katz, J., Kolesnikov, V. & Wang, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 525-537 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Optimizing authenticated garbling for faster secure two-party computation

Katz, J., Ranellucci, S., Rosulek, M. & Wang, X., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 365-391 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Secure computation with low communication from cross-checking

Dov Gordon, S., Ranellucci, S. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 59-85 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Simple and efficient two-server ORAM

Dov Gordon, S., Katz, J. & Wang, X., Jan 1 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 141-157 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2019

Covert security with public verifiability: faster, leaner, and simpler

Hong, C., Katz, J., Kolesnikov, V., Lu, W. J. & Wang, X., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 97-121 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Scalable Private Set Union from Symmetric-Key Techniques

Kolesnikov, V., Rosulek, M., Trieu, N. & Wang, X., Jan 1 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 636-666 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution