NSF CAREER Project Page

Broader Impacts

  1. Served as a coach in the CSGrad4US program in 2023 and mentored two students to get into top CS PhD program in US.
  2. Working in a team preparing an NIST submission for threshold cryptography
    Intro Talk
  3. Working in a team (MPC Tall Order) for systemizing knowledge of MPC.
  4. Working in a team of computer scientists and health data analysts to deploy MPC systems between the Chicago area hospitals and VA.
  5. “Giving Voice to the Silenced: Secure Reporting of Sexual Misconduct NDAs” accepted for short presentation at 2024 ACM Symposium on Computer Science and Law (ACM CSLaw’24).

Intellectual Merit

Core cryptography research

  1. Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
    Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
    In IEEE Symposium on Security and Privacy (S&P), 2024
  2. Lightweight Authentication of Web Data via Garble-Then-Prove
    Xiang Xie, Kang Yang, Xiao Wang and Yu Yu
    In USENIX Security, 2024
  3. The Hardness of LPN over Any Integer Ring and Field for PCG Applications
    Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2024
  4. Scalable Mixed-Mode MPC
    Radhika, Kang Yang, Jonathan Katz, and Xiao Wang
    In IEEE Symposium on Security and Privacy (S&P), 2024
  5. The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
    Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
    In ACM Transactions on Privacy and Security, 2023
  6. Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
    Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
    International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2023
  7. Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
    Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023
  8. Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
    Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023

Cryptography + ML/Database/Formal Methods

  1. Confidential-DPproof: Confidential Proof of Differentially Private Training
    Ali Shahin Shamsabadi, Gefei Tan, Tudor Ioan Cebere, Aurelien Bellet, Hamed Haddadi, Nicolas Papernot, Xiao Wang, and Adrian Weller
    In International Conference on Learning Representations (ICLR), 2024
    spotlight (5%)
  2. ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
    Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
    In USENIX Security, 2024
  3. Robust and Actively Secure Serverless Collaborative Learning
    Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, and Xiao Wang
    In Conference on Neural Information Processing Systems (NeurIPS), 2023
  4. Ou: Automating the Parallelization of Zero-Knowledge Protocols
    Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, and Zhong Shao
    In ACM Conference on Computer and Communications Security (CCS), 2023
  5. ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs
    Xiling Li, Chenkai Weng, Yongxin Xu, Xiao Wang, and Jennie Rogers
    In Proceedings of the VLDB Endowment (PLVDB), 2023