Publications
- Ian McQuoid and Jiayu Xu.
An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions.
ASIACRYPT 2023. [paper] [ePrint]
- Lawrence Roy and Jiayu Xu.
A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn’t Be Considered UC-Secure).
A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn’t Be Considered UC-Secure).
- Chris Peikert and Jiayu Xu.
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
- Julia Kastner, Julian Loss, and Jiayu Xu.
The Abe-Okamoto Partially Blind Signature Scheme Revisited.
The Abe-Okamoto Partially Blind Signature Scheme Revisited.
- Ian McQuoid, Mike Rosulek, and Jiayu Xu.
How to Obscure MPC Inputs.
How to Obscure MPC Inputs.
- S. Dov Gordon, Jonathan Katz, Mingyu Liang, and Jiayu Xu.
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy.
Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy.
- Julia Kastner, Julian Loss, and Jiayu Xu.
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
- Manuel Abdalla, Michel Barbosa, Jonathan Katz, Julian Loss, and Jiayu Xu.
Algebraic Adversaries in the Universal Composability Framework.
Algebraic Adversaries in the Universal Composability Framework.
- Stanisław Jarecki, Hugo Krawczyk, and Jiayu Xu.
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
- Jonathan Katz, Julian Loss, and Jiayu Xu.
On the Security of Time-lock Puzzles and Timed Commitments.
On the Security of Time-lock Puzzles and Timed Commitments.
- Manuel Abdalla, Michel Barbosa, Tatiana Bradley, Stanisław Jarecki, Jonathan Katz, and Jiayu Xu.
Universally Composable Relaxed Password Authenticated Key Exchange.
Universally Composable Relaxed Password Authenticated Key Exchange.
- Tatiana Bradley, Stanisław Jarecki, and Jiayu Xu.
Strong Asymmetric PAKE Based on Trapdoor CKEM.
Strong Asymmetric PAKE Based on Trapdoor CKEM.
- Tatiana Bradley, Jan Camenisch, Staniaław Jarecki, Anja Lehmann, Gregory Neven, and Jiayu Xu.
Password-Authenticated Public-Key Encryption.
Password-Authenticated Public-Key Encryption.
- Jung Yeon Hwang, Stanisław Jarecki, Taekyoung Kwon, Joohee Lee, Ji Sun Shin, and Jiayu Xu.
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
- Stanisław Jarecki, Hugo Krawczyk, and Jiayu Xu.
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
- Our protocol was recommended by the Crypto Forum Research Group (CFRG) for usage in IETF protocols in 2020.
- Stanisław Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu.
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
- Stanisław Jarecki, Aggelos Kiayias, Hugo Krawczyk, and Jiayu Xu.
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Manuscripts
Manuscripts
- Willow Barkan-Vered, Franklin Harding, Jonathan Keller, and Jiayu Xu.
On the Non-Malleability of ECVRF in the Algebraic Group Model.
On the Non-Malleability of ECVRF in the Algebraic Group Model.
Ph.D. Dissertation
Ph.D. Dissertation
Password-Based Cryptographic Protocols in the Client-Server Setting.
Password-Based Cryptographic Protocols in the Client-Server Setting.