Follow
Xiang Xie
Xiang Xie
PADO Labs
Verified email at padolabs.org
Title
Cited by
Cited by
Year
A simple provably secure key exchange scheme based on the learning with errors problem
J Ding, X Xie, X Lin
Cryptology ePrint Archive, 2012
3372012
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy
T Liu, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
912021
An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain
S Ma, Y Deng, D He, J Zhang, X Xie
IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020
822020
Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning
C Weng, K Yang, X Xie, J Katz, X Wang
30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021
772021
Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems
N Gama, M Izabachene, PQ Nguyen, X Xie
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
732016
Blockchain-based system for secure outsourcing of bilinear pairings
C Lin, D He, X Huang, X Xie, KKR Choo
Information Sciences 527, 590-601, 2020
652020
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time
J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
472021
Zero knowledge proofs from Ring-LWE
X Xie, R Xue, M Wang
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
402013
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
X Xie, R Xue, R Zhang
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
372012
Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications
C Lin, D He, X Huang, X Xie, KKR Choo
IEEE Systems Journal 15 (3), 4367-4378, 2020
282020
TOTA: fully homomorphic encryption with smaller parameters and stronger security
Z Yang, X Xie, H Shen, S Chen, J Zhou
Cryptology ePrint Archive, 2021
252021
Efficient online-friendly two-party ECDSA signature
H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
232021
AntMan: Interactive zero-knowledge proofs with sublinear communication
C Weng, K Yang, Z Yang, X Xie, X Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
202022
Compact zero-knowledge proofs for threshold ECDSA with trustless setup
TH Yuen, H Cui, X Xie
IACR International Conference on Public-Key Cryptography, 481-511, 2021
202021
Efficient threshold encryption from lossy trapdoor functions
X Xie, R Xue, R Zhang
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011
132011
Half-tree: Halving the cost of tree expansion in cot and dpf
X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu
Annual International Conference on the Theory and Applications of …, 2023
122023
Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie
International Conference on the Theory and Application of Cryptology and …, 2021
122021
Leaf: A faster secure search algorithm via localization, extraction, and reconstruction
R Wen, Y Yu, X Xie, Y Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
102020
Privacy-preserving computation in the post-quantum era
Y Yu, X Xie
National Science Review 8 (9), nwab115, 2021
82021
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013
S Agrawal, R Biswas, R Nishimaki, K Xagawa, X Xie, S Yamada
Designs, Codes and Cryptography 90 (10), 2301-2318, 2022
72022
The system can't perform the operation now. Try again later.
Articles 1–20