Publications

Some slides are in keynote format.

Articles in refereed conferences

  1. Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
    Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, and Xiao Wang
    In IEEE Symposium on Security and Privacy (S&P), 2024
    Report
  2. ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
    Daniel Luick, John Kolesar, Timos Antonopoulos, William R. Harris, James Parker, Ruzica Piskac, Eran Tromer, Xiao Wang, and Ning Luo
    In USENIX Security, 2024
    Report
  3. Lightweight Authentication of Web Data via Garble-Then-Prove
    Xiang Xie, Kang Yang, Xiao Wang and Yu Yu
    In USENIX Security, 2024
    Report
  4. The Hardness of LPN over Any Integer Ring and Field for PCG Applications
    Hanlin Liu, Xiao Wang, Kang Yang, and Yu Yu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2024
    Report
  5. Confidential-DPproof: Confidential Proof of Differentially Private Training
    Ali Shahin Shamsabadi, Gefei Tan, Tudor Ioan Cebere, Aurelien Bellet, Hamed Haddadi, Nicolas Papernot, Xiao Wang, and Adrian Weller
    In International Conference on Learning Representations (ICLR), 2024
    Report
    spotlight (5%)
  6. Scalable Mixed-Mode MPC
    Radhika, Kang Yang, Jonathan Katz, and Xiao Wang
    In IEEE Symposium on Security and Privacy (S&P), 2024
    Report
  7. Robust and Actively Secure Serverless Collaborative Learning
    Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, and Xiao Wang
    In Conference on Neural Information Processing Systems (NeurIPS), 2023
    Report
  8. Ou: Automating the Parallelization of Zero-Knowledge Protocols
    Yuyang Sang, Ning Luo, Samuel Judson, Ben Chaimberg, Timos Antonopoulos, Xiao Wang, Ruzica Piskac, and Zhong Shao
    In ACM Conference on Computer and Communications Security (CCS), 2023
    Report
  9. Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
    Hongrui Cui, Xiao Wang, Kang Yang, and Yu Yu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023
    Report
  10. Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
    Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2023
    Report
  11. Confidential-PROFITT: Confidential PROof of FaIr Training of Trees
    Ali Shahin Shamsabadi, Sierra Calanda Wyllie, Olive Franzese, Natalie Dullerud, Sébastien Gambs, Nicolas Papernot, Xiao Wang, and Adrian Weller
    In International Conference on Learning Representations (ICLR), 2023
    Report
    notable-top-5%
  12. Deja Vu: Continual Model Generalization for Unseen Domains
    Chenxi Liu, Lixu Wang, Lingjuan Lyu, Chen Sun, Xiao Wang, and Qi Zhu
    In International Conference on Learning Representations (ICLR), 2023
    Report
  13. Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off
    Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, and Xiao Wang
    International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2023
    Report
  14. Proving UNSAT in Zero Knowledge
    Ning Luo, Timos Antonopoulos, William Harris, Ruzica Piskac, Eran Tromer, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2022
    Report Code
    CCS Distinguished Paper Award
  15. AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
    Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2022
    Report
  16. Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
    Kang Yang and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2022
    Report
  17. Triply Adaptive UC NIZK
    Ran Canetti, Pratik Sarkar, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2022
    Report
  18. ppSAT: Towards Two-Party Private SAT Solving
    Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, and Xiao Wang
    In USENIX Security, 2022
    Report Code
  19. Non-Transferable Learning: A New Approach for Model Ownership Verification and Applicability Authorization
    Lixu Wang, Shichao Xu, Ruiqi Xu, Xiao Wang, and Qi Zhu
    In International Conference on Learning Representations (ICLR), 2022
    Report Code
    oral presentation
  20. Federated Class-Incremental Learning
    Jiahua Dong, Lixu Wang, Zhen Fang, Gan Sun, Shichao Xu, Xiao Wang, and Qi Zhu
    In the Conference on Computer Vision and Pattern Recognition (CVPR), 2022
    Report
  21. Constant-Overhead Zero-Knowledge for RAM Programs
    Olive Franzese, Jonathan Katz, Steve Lu, Rafail Ostrovsky, Xiao Wang, and Chenkai Weng
    In ACM Conference on Computer and Communications Security (CCS), 2021
    Report Code
  22. Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
    Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang
    In USENIX Security, 2021
    Report Code
  23. QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field
    Kang Yang, Pratik Sarkar, Chenkai Weng, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2021
    Report Code
    CCS Best Paper Award runner up
  24. Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
    Chenkai Weng, Kang Yang, Jonathan Katz, and Xiao Wang
    In IEEE Symposium on Security and Privacy (S&P), 2021
    Report
  25. CaPC Learning: Confidential and Private Collaborative Learning
    Christopher A. Choquette-Choo, Natalie Dullerud, Adam Dziedzic, Yunxiang Zhang, Somesh Jha, Nicolas Papernot, and Xiao Wang
    In International Conference on Learning Representations (ICLR), 2021
    Report Code
  26. Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification
    Xiao Dong, David Randolph, Chenkai Weng, Abel Kho, Jennie Rogers, and Xiao Wang
    In American Medical Informatics Association Informatics Summit (AMIA), 2021
    Report
  27. Addressing Class Imbalance in Federated Learning
    Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu
    In AAAI Conference on Artificial Intelligence (AAAI), 2021
    Report
  28. Ferret: Fast Extension for coRRElated oT with small communication
    Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2020
    Report Code
  29. More Efficient MPC from Improved Triple Generation and Authenticated Garbling
    Kang Yang, Xiao Wang, and Jiang Zhang
    In ACM Conference on Computer and Communications Security (CCS), 2020
    Report
  30. Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security
    Ran Canetti, Pratik Sarkar, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2020
    Report
  31. Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
    Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, and Yu Yu
    In International Cryptology Conference (CRYPTO), 2020
    Report Code
  32. Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
    Chun Guo, Jonathan Katz, Xiao Wang, and Yu Yu
    In IEEE Symposium on Security and Privacy (S&P), 2020
    Report Code
  33. Blazing Fast OT for Three-Round UC OT Extension
    Ran Canetti, Pratik Sarkar, and Xiao Wang
    In Public-Key Cryptography (PKC), 2020
    Report
  34. Scalable Private Set Union from Symmetric-Key Techniques
    Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2019
    Report Code
  35. Covert Security with Public Verifiability: Faster, Leaner, and Simpler
    Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, and Xiao Wang
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2019
    Report Code
  36. Secure Computation with Low Communication from Cross-checking
    S. Dov Gordon, Samuel Ranellucci, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
    Report
  37. Simple and Efficient Two-Server ORAM
    Dov Gordon, Jonathan Katz, and Xiao Wang
    In Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2018
    Report
  38. Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures
    Jonathan Katz, Vladimir Kolesnikov, and Xiao Wang
    In ACM Conference on Computer and Communications Security (CCS), 2018
    Report
  39. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
    Jonathan Katz, Samuel Ranellucci, Mike Rosulek, and Xiao Wang
    In International Cryptology Conference (CRYPTO), 2018
    Report
  40. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Xiao Wang, Samuel Ranellucci, and Jonathan Katz
    In ACM Conference on Computer and Communications Security (CCS), 2017
    Report Code Slides
    CCS Best Paper Award
  41. Global-Scale Secure Multi-Party Computation
    Xiao Wang, Samuel Ranellucci, and Jonathan Katz
    In ACM Conference on Computer and Communications Security (CCS), 2017
    Report Code Slides
  42. Faster Secure Two-Party Computation in the Single-Execution Setting
    Xiao Wang, Alex J. Malozemoff, and Jonathan Katz
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017
    Report Code Slides
  43. Secure Computation of MIPS Machine Code
    Xiao Wang, S. Dov Gordon, Allen McIntosh, and Jonathan Katz
    In European Symposium on Research in Computer Security (ESORICS), 2016
    Report Code Slides
  44. Revisiting Square Root ORAM: Efficient Random Access in Multi-Party Computation
    Samee Zahur, Xiao Wang, Mariana Raykova, Adria Gascon, Jack Doerner, David Evans, and Jonathan Katz
    In IEEE Symposium on Security and Privacy (S&P), 2016
    Report Code
  45. Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
    Xiao Wang, Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, and Diyue Bu
    In ACM Conference on Computer and Communications Security (CCS), 2015
    Report Code Slides
  46. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
    Xiao Wang, T-H. Hubert Chan, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2015
    Report Code Slides
  47. ObliVM: A Programming Framework for Secure Computation
    Chang Liu, Xiao Wang, Kartik Nayak, Yan Huang, and Elaine Shi
    In IEEE Symposium on Security and Privacy (S&P), 2015
    Report Backend code Frontend code 1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition
  48. GraphSC: Parallel Secure Computation Made Easy
    Kartik Nayak, Xiao Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi
    In IEEE Symposium on Security and Privacy (S&P), 2015
    Report Code
  49. SCORAM: Oblivious RAM for Secure Computation
    Xiao Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2014
    Report Code Slides
  50. Oblivious Data Structures
    Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang
    In ACM Conference on Computer and Communications Security (CCS), 2014
    Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition
    Report

Journal articles

  1. The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
    Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
    In ACM Transactions on Privacy and Security, 2023
    Report
  2. SoK: Vector OLE-Based Zero-Knowledge Protocols
    Carsten Baum, Samuel Dittmer, Peter Scholl, and Xiao Wang
    In Designs, Codes and Cryptography, 2023
    Report
  3. ZKSQL: Verifiable and Efficient Query Evaluation with Zero-Knowledge Proofs
    Xiling Li, Chenkai Weng, Yongxin Xu, Xiao Wang, and Jennie Rogers
    In Proceedings of the VLDB Endowment (PLVDB), 2023
    Report
  4. Private Multi-Winner Voting for Machine Learning
    Adam Dziedzic, Christopher A. Choquette-Choo, Natalie Dullerud, Vinith Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, and Xiao Wang
    In Proceedings on Privacy Enhancing Technologies (PoPETs), 2023
    Report
  5. Efficient and Secure Quantile Aggregation of Private Data Streams
    Xiao Lan, Hongjian Jin, Hui Guo, and Xiao Wang
    IEEE Transactions on Information Forensics and Security (TIFS), 2023
    Report
  6. Provable Security of SP Networks with Partial Non-Linear Layers
    Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, and Yu Yu
    In IACR Transactions on Symmetric Cryptology (ToSC), 2021
    Report
  7. SAQE: Practical Privacy-Preserving Approximate Query Processing for Data Federations
    Johes Bater, Yongjoo Park, Xi He, Xiao Wang, and Jennie Rogers
    In Proceedings of the VLDB Endowment (PLVDB), 2020
    Report
  8. Privacy-Preserving Microbiome Analysis Using Secure Computation
    Justin Wagner, Joseph N. Paulson, Xiao Wang, Bobby Bhattacharjee, and Hector Corrada Bravo
    In Bioinformatics, 2016
    Report Code

Workshop, Demo, Tutorial, and Book Chapters

  1. RESCU-SQL: Oblivious Querying for the Zero Trust Cloud
    Xiling Li, Gefei Tan, Xiao Wang, Jennie Rogers, and Soamar Homsi
    In Proceedings of the VLDB Endowment (PLVDB), 2023
    Demo
  2. Oblivious Data Structures
    Xiao Wang
    In Encyclopedia of Cryptography, Security and Privacy
    Book Chapter
  3. VaultDB: Facilitating Secure Analytics over Multiple Private Data Sources
    Xiao Wang, Jennie Rogers
    Workshop on Privacy Enhancing Technologies for the Homeland Security Enterprise, 2022
    Report
  4. Practical Security and Privacy for Database Systems
    Xi He, Jennie Rogers, Johes Bater, Ashwin Machanvajjhala, Chenghong Wang, and Xiao Wang.
    In ACM International Conference on Management of Data (SIGMOD), 2021
    Tutorial
  5. Privacy Changes Everything
    Jennie Rogers, Johes Bater, Xi He, Ashwin Machanavajjhala, Madhav Suresh, and Xiao Wang
    In POLY Workshop at VLDB, 2019
    Report

Other Manuscripts

  1. An Efficient ZK Compiler from SIMD Circuits to General Circuits
    Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, and Yu Yu
    Report
  2. Unmodified Half-Gates is Adaptively Secure
    Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, and Zheli Liu
    Report
  3. VaultDB: A Real-World Pilot of Secure Multi-Party Computation within a Clinical Research Network
    Jennie Rogers, Elizabeth Adetoro, Johes Bater, Talia Canter, Dong Fu, Andrew Hamilton, Amro Hassan, Ashley Martinez, Erick Michalski, Vesna Mitrovic, Fred Rachman, Raj Shah, Matt Sterling, Kyra VanDoren, Theresa L. Walunas, Xiao Wang, and Abel Kho
    Report
  4. Secure Machine Learning over Relational Data
    Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, and Xiao Wang
    Report
  5. Eavesdrop the Composition Proportion of Training Labels in Federated Learning
    Lixu Wang, Shichao Xu, Xiao Wang, and Qi Zhu
    Report
  6. Efficiently Enforcing Input Validity in Secure Two-party Computation
    Jonathan Katz, Alex J. Malozemoff, and Xiao Wang
    Report Code