About me

I'm a teacher at Sichuan University.

I enjoy teaching, research, and I am helpful.

I have spent much time on taking photos, watching OnePiece...

I believe that nothing is easy in the world, but it is worth for us to try our best.



What are my research interests

  • design icon

    Authenticated Key Exchange Protocol

    One kind of the most commonly used security protocols.

  • Web development icon

    Multi-party Computation

    A very very very hard but interesting and challenging field in cryptography.

  • mobile app icon

    Differential Privacy

    A powerful tool to protect individual privacy.

  • camera icon

    Cryptographic Application

    Any applications where cryptographic tools work.


  • Daniel lewis



  • Jessica miller



  • Emily evans



  • Henry william





  1. Chinese Academy of Sciences, Institute of Information Engineering

    2012.09 - 2017.12

    Ph.D.:Design and Analysis of Application-Oriented Authenticated Key Establishment Protocols, advisor:Jing Xu

  2. Sichuan University, College of Electronics and Information Engineering

    2008.09 - 2012.06



  1. Sichuan University, Cyber Science Research Institute / Associate Professor

    2023.09 - today

    Working on the application of multi-party computation.

  2. Northwestern Unversity, Computer Science Department / Visiting scholar

    2019.09 - 2020.08

    Working on improving the efficiency of maliciously secure MPC to an almost optimal cost and designing differentially private multi-party data stream aggregation protocol. (working with Xiao Wang)

  3. Sichuan University, Cyber Science Research Institute / Assistant Researcher

    2018.01 - 2023.08

    Working on big data platform authentication protocol optimization and national cryptographic algorithms embedding of Hyperledger Fabric platform.

My skills

  • Security Proof
  • Writing


Selected Papers

  1. Efficient and Secure Quantile Aggregation of Private Data Streams.

    Xiao Lan, Hongjian Jin, Hui Guo, Xiao Wang.

    In IEEE Transactions on Information Forensics and Security (TIFS), 2023. Paper

  2. A Systematic Security Analysis of EMV Protocol.

    XiaoLan, JingXu, Zhenfeng Zhang, Xingshu Chen, Yonggang Luo.

    In Computer Standards & Interfaces, 2022.Paper

  3. BNRDT: When Data Transmission Meets Blockchain.

    Hongjian Jin, Xingshu Chen, Xiao Lan, Hui Guo, Hongxia Zhang, Qi Cao.

    n Security and Communication Networks (SCN), 2020.Paper

  4. Ferret: Fast Extension for Correlated OT with Small Communication.

    Kang Yang, Chenkai Weng, Xiao Lan, Jiang Zhang, Xiao Wang.

    In ACM Conference on Computer and Communications Security (ACM CCS), 2020.Paper

  5. BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication Scheme.

    Hongxia Zhang, Xingshu Chen, Xiao Lan, Hongjian Jin, Qi Cao.

    In Journal of Information Security and Applications (JISA), 2020.Paper

  6. Modular Security Analysis of OAuth 2.0 in the Three-Party Setting.

    Xinyu Li, Jing Xu, Zhenfeng Zhang, Xiao Lan, Yuchen Wang.

    In 5th IEEE European Symposium on Security and Privacy (EuroS&P), 2020.Paper

  7. Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3.

    Xiao Lan, Jing Xu, Zhenfeng Zhang, Wentao Zhu.

    IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.Paper

  8. Accountable Proxy Re-Encryption for Secure Data Sharing.

    Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An, Xiao Lan.

    In IEEE Transactions on Dependable and Secure Computing (TDSC), 2018.Paper

  9. 5G移动通信网络安全研究.

    冯登国, 徐静, 兰晓.

    In Journal of Software (软件学报), 2018.Paper

  10. One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model.

    Xiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang.

    In 12th China International Conference on Information Security and Cryptology (Inscrypt), 2016.Paper



Contact Form