A simple provably secure key exchange scheme based on the learning with errors problem J Ding, X Xie, X Lin
Cryptology ePrint Archive, 2012
338 2012 Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
92 2021 An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain S Ma, Y Deng, D He, J Zhang, X Xie
IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020
83 2020 Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning C Weng, K Yang, X Xie, J Katz, X Wang
30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021
80 2021 Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems N Gama, M Izabachene, PQ Nguyen, X Xie
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
74 2016 Blockchain-based system for secure outsourcing of bilinear pairings C Lin, D He, X Huang, X Xie, KKR Choo
Information Sciences 527, 590-601, 2020
65 2020 Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
47 2021 Zero knowledge proofs from Ring-LWE X Xie, R Xue, M Wang
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
40 2013 Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting X Xie, R Xue, R Zhang
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
37 2012 Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications C Lin, D He, X Huang, X Xie, KKR Choo
IEEE Systems Journal 15 (3), 4367-4378, 2020
29 2020 TOTA: fully homomorphic encryption with smaller parameters and stronger security Z Yang, X Xie, H Shen, S Chen, J Zhou
Cryptology ePrint Archive, 2021
25 2021 Efficient online-friendly two-party ECDSA signature H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
24 2021 AntMan: Interactive zero-knowledge proofs with sublinear communication C Weng, K Yang, Z Yang, X Xie, X Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
21 2022 Compact zero-knowledge proofs for threshold ECDSA with trustless setup TH Yuen, H Cui, X Xie
IACR International Conference on Public-Key Cryptography, 481-511, 2021
20 2021 Efficient threshold encryption from lossy trapdoor functions X Xie, R Xue, R Zhang
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011
13 2011 Half-tree: Halving the cost of tree expansion in cot and dpf X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu
Annual International Conference on the Theory and Applications of …, 2023
12 2023 Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie
International Conference on the Theory and Application of Cryptology and …, 2021
12 2021 Leaf: A faster secure search algorithm via localization, extraction, and reconstruction R Wen, Y Yu, X Xie, Y Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
10 2020 Privacy-preserving computation in the post-quantum era Y Yu, X Xie
National Science Review 8 (9), nwab115, 2021
8 2021 Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013 S Agrawal, R Biswas, R Nishimaki, K Xagawa, X Xie, S Yamada
Designs, Codes and Cryptography 90 (10), 2301-2318, 2022
7 2022