| A simple provably secure key exchange scheme based on the learning with errors problem J Ding, X Xie, X Lin Cryptology ePrint Archive, 2012 | 404 | 2012 |
| Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 262 | 2021 |
| Mystique: Efficient conversions for {Zero-Knowledge} proofs with applications to machine learning C Weng, K Yang, X Xie, J Katz, X Wang 30th USENIX Security Symposium (USENIX Security 21), 501-518, 2021 | 203 | 2021 |
| Structural lattice reduction: generalized worst-case to average-case reductions and homomorphic cryptosystems N Gama, M Izabachène, PQ Nguyen, X Xie Annual International Conference on the Theory and Applications of …, 2016 | 118 | 2016 |
| An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain S Ma, Y Deng, D He, J Zhang, X Xie IEEE Transactions on Dependable and Secure Computing 18 (2), 641-651, 2020 | 114 | 2020 |
| Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 92 | 2021 |
| Blockchain-based system for secure outsourcing of bilinear pairings C Lin, D He, X Huang, X Xie, KKR Choo Information Sciences 527, 590-601, 2020 | 76 | 2020 |
| AntMan: Interactive zero-knowledge proofs with sublinear communication C Weng, K Yang, Z Yang, X Xie, X Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 60 | 2022 |
| TOTA: fully homomorphic encryption with smaller parameters and stronger security Z Yang, X Xie, H Shen, S Chen, J Zhou Cryptology ePrint Archive, 2021 | 59 | 2021 |
| Half-tree: Halving the cost of tree expansion in COT and DPF X Guo, K Yang, X Wang, W Zhang, X Xie, J Zhang, Z Liu Annual International Conference on the Theory and Applications of …, 2023 | 58 | 2023 |
| Efficient online-friendly two-party ECDSA signature H Xue, MH Au, X Xie, TH Yuen, H Cui Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 56 | 2021 |
| Ppchain: A privacy-preserving permissioned blockchain architecture for cryptocurrency and other regulated applications C Lin, D He, X Huang, X Xie, KKR Choo IEEE Systems Journal 15 (3), 4367-4378, 2020 | 49 | 2020 |
| Zero knowledge proofs from ring-LWE X Xie, R Xue, M Wang International Conference on Cryptology and Network Security, 57-73, 2013 | 49 | 2013 |
| Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting X Xie, R Xue, R Zhang International Conference on Security and Cryptography for Networks, 1-18, 2012 | 41 | 2012 |
| Compact zero-knowledge proofs for threshold ECDSA with trustless setup TH Yuen, H Cui, X Xie IACR International Conference on Public-Key Cryptography, 481-511, 2021 | 39 | 2021 |
| Efficient multiplicative-to-additive function from Joye-Libert cryptosystem and its application to threshold ECDSA H Xue, MH Au, M Liu, KY Chan, H Cui, X Xie, TH Yuen, C Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 29 | 2023 |
| Promise -Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups Y Deng, S Ma, X Zhang, H Wang, X Song, X Xie International Conference on the Theory and Application of Cryptology and …, 2021 | 27 | 2021 |
| Scalable multi-party computation protocols for machine learning in the honest-majority setting F Liu, X Xie, Y Yu Proc. 33rd USENIX Secur. Symp.(USENIX Secur.), 1939-1956, 2024 | 20 | 2024 |
| Lightweight Authentication of Web Data via Garble-Then-Prove. X Xie, K Yang, X Wang, Y Yu IACR Cryptol. ePrint Arch. 2023, 964, 2023 | 16 | 2023 |
| Efficient threshold encryption from lossy trapdoor functions X Xie, R Xue, R Zhang International Workshop on Post-Quantum Cryptography, 163-178, 2011 | 16 | 2011 |