A simple provably secure key exchange scheme based on the learning with errors problem J Ding, X Xie, X Lin Cryptology ePrint Archive, 2012 | 352 | 2012 |
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 125 | 2021 |
Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning C Weng, K Yang, X Xie, J Katz, X Wang 30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021 | 100 | 2021 |
An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain S Ma, Y Deng, D He, J Zhang, X Xie IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020 | 88 | 2020 |
Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems N Gama, M Izabachène, PQ Nguyen, X Xie Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 80 | 2016 |
Blockchain-based system for secure outsourcing of bilinear pairings C Lin, D He, X Huang, X Xie, KKR Choo Information Sciences 527, 590-601, 2020 | 69 | 2020 |
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 51 | 2021 |
Zero knowledge proofs from ring-LWE X Xie, R Xue, M Wang Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 41 | 2013 |
Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications C Lin, D He, X Huang, X Xie, KKR Choo IEEE Systems Journal 15 (3), 4367-4378, 2020 | 37 | 2020 |
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting X Xie, R Xue, R Zhang Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 37 | 2012 |
TOTA: fully homomorphic encryption with smaller parameters and stronger security Z Yang, X Xie, H Shen, S Chen, J Zhou Cryptology ePrint Archive, 2021 | 33 | 2021 |
Efficient online-friendly two-party ECDSA signature H Xue, MH Au, X Xie, TH Yuen, H Cui Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 29 | 2021 |
AntMan: Interactive zero-knowledge proofs with sublinear communication C Weng, K Yang, Z Yang, X Xie, X Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 28 | 2022 |
Compact zero-knowledge proofs for threshold ECDSA with trustless setup TH Yuen, H Cui, X Xie IACR International Conference on Public-Key Cryptography, 481-511, 2021 | 23 | 2021 |
Half-tree: Halving the cost of tree expansion in cot and dpf X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu Annual International Conference on the Theory and Applications of …, 2023 | 18 | 2023 |
Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie International Conference on the Theory and Application of Cryptology and …, 2021 | 15 | 2021 |
Efficient threshold encryption from lossy trapdoor functions X Xie, R Xue, R Zhang Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011 | 14 | 2011 |
Leaf: A faster secure search algorithm via localization, extraction, and reconstruction R Wen, Y Yu, X Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 11 | 2020 |
Privacy-preserving computation in the post-quantum era Y Yu, X Xie National Science Review 8 (9), nwab115, 2021 | 10 | 2021 |
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013 S Agrawal, R Biswas, R Nishimaki, K Xagawa, X Xie, S Yamada Designs, Codes and Cryptography 90 (10), 2301-2318, 2022 | 8 | 2022 |