Xiao Wang

Ph.D student in Computer Science
Department of Computer Science
University of Maryland, College Park
College Park, MD 20742, USA

Curriculum vitae   Google Scholar

Email: wangxiao (AT) cs (DOT) umd (DOT) edu

I'm a 4th year Ph.D. student working on security and cryptography, focusing on practical secure computation. My advisor is Jonathan Katz.


Preprint

  1. Efficiently Enforcing Input Validity in Secure Two-party Computation
    Jonathan Katz, Alex J. Malozemoff, and Xiao Wang* [Code]

  2. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation
    Xiao Wang, Samuel Ranellucci, Jonathan Katz

  3. Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation
    Jonathan Katz, Samuel Ranellucci, and Xiao Wang*


Publication

Some slides are in keynote format. Please refer to "Quick Links" for a convertor to powerpoint or send me an email.

  1. Faster Secure Two-Party Computation in the Single-Execution Setting
    Xiao Wang, Alex J. Malozemoff, and Jonathan Katz
    In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2017. [Code]

  2. Secure Computation of MIPS Machine Code
    Xiao Wang, S. Dov Gordon, Allen McIntosh, and Jonathan Katz
    In European Symposium on Research in Computer Security (ESORICS), 2016. [Code] [Slides]

  3. Revisiting Square Root ORAM: Efficient Random Access in Multi-Party Computation
    Samee Zahur, Xiao Wang, Mariana Raykova, Adria Gascon, Jack Doerner, David Evans, and Jonathan Katz
    In IEEE Symposium on Security and Privacy (S&P), 2016. [Code]

  4. Privacy-Preserving Microbiome Analysis Using Secure Computation
    Justin Wagner, Joseph N. Paulson, Xiao Wang, Bobby Bhattacharjee, and Hector Corrada Bravo
    In Bioinformatics, 2016. [Code]

  5. Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
    Xiao Wang, Yan Huang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, and Diyue Bu
    In ACM Conference on Computer and Communications Security (CCS), 2015. [Code] [Slides]

  6. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
    Xiao Wang, T-H. Hubert Chan, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2015. [Code] [Slides]

  7. ObliVM: A Programming Framework for Secure Computation.
    Chang Liu, Xiao Wang, Kartik Nayak, Yan Huang, and Elaine Shi
    In IEEE Symposium on Security and Privacy (S&P), 2015. [Back end code] [Front end code]
    1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition

  8. GraphSC: Parallel Secure Computation Made Easy.
    Kartik Nayak, Xiao Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, and Elaine Shi.
    In IEEE Symposium on Security and Privacy (S&P), 2015. [Code]

  9. SCORAM: Oblivious RAM for Secure Computation
    Xiao Wang, Yan Huang, T-H. Hubert Chan, abhi shelat, and Elaine Shi
    In ACM Conference on Computer and Communications Security (CCS), 2014. [Code] [Slides]

  10. Oblivious Data Structures
    Xiao Wang, Kartik Nayak, Chang Liu, T-H. Hubert Chan, Elaine Shi, Emil Stefanov, and Yan Huang
    In ACM Conference on Computer and Communications Security (CCS), 2014. [Slides]
    Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition


Other Open Sourced Code

  1. iDASH Secure Genome Analysis
    Won an "HLI Award for Secure Multiparty Computing" for the iDash Secure Genome Analysis Competition.

  2. Tree-based ORAM simulation framework
    Test and obtain the stash size for tree-based ORAM experimentally.


Quick links:
  1. Keynote to Powerpoint Online Convertor
  2. Math Symbols in Unicode
  3. Latex Symbols Reference