Publications

Some slides are in keynote format.

Articles in refereed conferences

  1. Ferret: Fast Extension for coRRElated oT with small communication
    Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2020
    Report
  2. More Efficient MPC from Improved Triple Generation and Authenticated Garbling
    Kang Yang, Xiao Wang, and Jiang Zhang
    In ACM Conference on Computer and Communications Security (CCS), 2020
    Report
  3. Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
    Ran Canetti and Pratik Sarkar and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2020
    Report
  4. Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
    Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, and Yu Yu
    In International Cryptology Conference (CRYPTO), 2020
    Report Code
  5. Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
    Chun Guo, Jonathan Katz, Xiao Wang, and Yu Yu
    In IEEE Symposium on Security and Privacy (S&P), 2020
    Report Code
  6. Blazing Fast OT for Three-Round UC OT Extension
    Ran Canetti, Pratik Sarkar, and Xiao Wang
    In Public-Key Cryptography (PKC), 2020
    Report
  7. Scalable Private Set Union from Symmetric-Key Techniques
    Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2019
    Report Code
  8. Covert Security with Public Verifiability: Faster, Leaner, and Simpler
    Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, and Xiao Wang
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    Report Code
  9. Secure Computation with Low Communication from Cross-checking
    S. Dov Gordon, Samuel Ranellucci, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
    Report
  10. Simple and Efficient Two-Server ORAM
    Dov Gordon, Jonathan Katz, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
    Report
  11. Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
    Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2018
    Report
  12. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
    Jonathan Katz, Samuel Ranellucci, Mike Rosulek, and Xiao Wang
    In International Cryptology Conference (CRYPTO), 2018
    Report
  13. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Xiao Wang, Samuel Ranellucci, and Jonathan Katz
    In ACM Conference on Computer and Communications Security (CCS), 2017
    Report Code Slides CCS Best paper award
  14. Global-Scale Secure Multi-Party Computation
    Xiao Wang, Samuel Ranellucci, and Jonathan Katz
    In ACM Conference on Computer and Communications Security (CCS), 2017
    Report Code Slides
  15. Faster Secure Two-Party Computation in the Single-Execution Setting
    Xiao Wang, Alex J. Malozemoff, and Jonathan Katz
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    Report Code Slides
  16. Secure Computation of MIPS Machine Code
    Xiao Wang, S. Dov Gordon, Allen McIntosh, and Jonathan Katz
    In European Symposium on Research in Computer Security (ESORICS), 2016
    Report Code Slides
  17. Revisiting Square Root ORAM: Efficient Random Access in Multi-Party Computation
    Samee Zahur, Xiao Wang, Mariana Raykova, Adria Gascon, Jack Doerner, David Evans, and Jonathan Katz
    In IEEE Symposium on Security and Privacy (S&P), 2016
    Report Code
  18. Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
    Xiao Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, and Diyue Bu
    In ACM Conference on Computer and Communications Security (CCS), 2015
    Report Code Slides
  19. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
    Xiao Wang, T-H. Hubert Chan, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2015
    Report Code Slides
  20. ObliVM: A Programming Framework for Secure Computation
    Chang Liu, Xiao Wang, Kartik Nayak, Yan Huang, and Elaine Shi
    In IEEE Symposium on Security and Privacy (S&P), 2015
    Report Backend code Frontend code 1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition
  21. GraphSC: Parallel Secure Computation Made Easy
    Kartik Nayak, Xiao Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi
    In IEEE Symposium on Security and Privacy (S&P), 2015
    Report Code
  22. SCORAM: Oblivious RAM for Secure Computation
    Xiao Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2014
    Report Code Slides
  23. Oblivious Data Structures
    Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang
    In ACM Conference on Computer and Communications Security (CCS), 2014
    Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition
    Report

Journal articles

  1. SAQE: Practical Privacy-Preserving Approximate Query Processing for Data Federations
    Johes Bater, Yongjoo Park, Xi He, Xiao Wang, and Jennie Rogers
    In Proceedings of the VLDB Endowment (PLVDB), 2020
    Report
  2. Privacy-Preserving Microbiome Analysis Using Secure Computation
    Justin Wagner, Joseph N. Paulson, Xiao Wang, Bobby Bhattacharjee, and Hector Corrada Bravo
    In Bioinformatics, 2016
    Report Code

Workshop papers

  1. Privacy Changes Everything
    Jennie Rogers, Johes Bater, Xi He, Ashwin Machanavajjhala, Madhav Suresh, and Xiao Wang
    In POLY Workshop at VLDB, 2019
    Report

Preprint

  1. Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
    Chenkai Weng, Kang Yang, Jonathan Katz, and Xiao Wang
    Report
  2. Efficiently Enforcing Input Validity in Secure Two-party Computation
    Jonathan Katz, Alex J. Malozemoff, and Xiao Wang
    Report Code