フォロー
Xiang Xie
Xiang Xie
PADO Labs
確認したメール アドレス: padolabs.org
タイトル
引用先
引用先
A simple provably secure key exchange scheme based on the learning with errors problem
J Ding, X Xie, X Lin
Cryptology ePrint Archive, 2012
3632012
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy
T Liu, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1512021
Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning
C Weng, K Yang, X Xie, J Katz, X Wang
30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021
1272021
An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain
S Ma, Y Deng, D He, J Zhang, X Xie
IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020
962020
Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems
N Gama, M Izabachène, PQ Nguyen, X Xie
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
892016
Blockchain-based system for secure outsourcing of bilinear pairings
C Lin, D He, X Huang, X Xie, KKR Choo
Information Sciences 527, 590-601, 2020
722020
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time
J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
612021
Zero knowledge proofs from ring-LWE
X Xie, R Xue, M Wang
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
422013
TOTA: fully homomorphic encryption with smaller parameters and stronger security
Z Yang, X Xie, H Shen, S Chen, J Zhou
Cryptology ePrint Archive, 2021
392021
Efficient online-friendly two-party ECDSA signature
H Xue, MH Au, X Xie, TH Yuen, H Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
382021
Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications
C Lin, D He, X Huang, X Xie, KKR Choo
IEEE Systems Journal 15 (3), 4367-4378, 2020
382020
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
X Xie, R Xue, R Zhang
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
372012
AntMan: Interactive zero-knowledge proofs with sublinear communication
C Weng, K Yang, Z Yang, X Xie, X Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
322022
Compact zero-knowledge proofs for threshold ECDSA with trustless setup
TH Yuen, H Cui, X Xie
IACR International Conference on Public-Key Cryptography, 481-511, 2021
272021
Half-tree: Halving the cost of tree expansion in cot and dpf
X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu
Annual International Conference on the Theory and Applications of …, 2023
252023
Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie
International Conference on the Theory and Application of Cryptology and …, 2021
182021
Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA
H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
152023
Leaf: A faster secure search algorithm via localization, extraction, and reconstruction
R Wen, Y Yu, X Xie, Y Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
152020
Efficient threshold encryption from lossy trapdoor functions
X Xie, R Xue, R Zhang
Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei …, 2011
152011
Privacy-preserving computation in the post-quantum era
Y Yu, X Xie
National Science Review 8 (9), nwab115, 2021
122021
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20