| Secureml: A system for scalable privacy-preserving machine learning P Mohassel, Y Zhang 2017 IEEE symposium on security and privacy (SP), 19-38, 2017 | 2742 | 2017 |
| All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption Y Zhang, J Katz, C Papamanthou 25th USENIX Security Symposium (USENIX Security 16), 707-720, 2016 | 699 | 2016 |
| Libra: Succinct zero-knowledge proofs with optimal prover computation T Xie, J Zhang, Y Zhang, C Papamanthou, D Song Annual International Cryptology Conference, 733-764, 2019 | 370 | 2019 |
| vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou 2017 IEEE Symposium on Security and Privacy (SP), 863-880, 2017 | 285 | 2017 |
| Transparent polynomial delegation and its applications to zero knowledge proof J Zhang, T Xie, Y Zhang, D Song 2020 IEEE Symposium on Security and Privacy (SP), 859-876, 2020 | 273 | 2020 |
| Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 262 | 2021 |
| zkbridge: Trustless cross-chain bridges made practical T Xie, J Zhang, Z Cheng, F Zhang, Y Zhang, Y Jia, D Boneh, D Song Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 250 | 2022 |
| IntegriDB: Verifiable SQL for outsourced databases Y Zhang, J Katz, C Papamanthou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 170 | 2015 |
| Orion: Zero knowledge proof with linear prover time T Xie, Y Zhang, D Song Annual International Cryptology Conference, 299-328, 2022 | 157 | 2022 |
| CHURP: dynamic-committee proactive secret sharing SKD Maram, F Zhang, L Wang, A Low, Y Zhang, A Juels, D Song Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 148 | 2019 |
| Zero knowledge proofs for decision tree predictions and accuracy J Zhang, Z Fang, Y Zhang, D Song Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 143 | 2020 |
| Ligero++: A new optimized sublinear IOP R Bhadauria, Z Fang, C Hazay, M Venkitasubramaniam, T Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 124 | 2020 |
| vRAM: Faster verifiable RAM with program-independent preprocessing Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou 2018 IEEE Symposium on Security and Privacy (SP), 908-925, 2018 | 111 | 2018 |
| Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 92 | 2021 |
| A zero-knowledge version of vSQL Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou Cryptology ePrint Archive, 2017 | 90 | 2017 |
| Edrax: A cryptocurrency with stateless transaction validation A Chepurnoy, C Papamanthou, S Srinivasan, Y Zhang Cryptology ePrint Archive, 2018 | 88 | 2018 |
| Hyperproofs: Aggregating and maintaining proofs in vector commitments S Srinivasan, A Chepurnoy, C Papamanthou, A Tomescu, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 3001-3018, 2022 | 72 | 2022 |
| Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs T Liu, T Xie, J Zhang, D Song, Y Zhang 2024 IEEE Symposium on Security and Privacy (SP), 1777-1793, 2024 | 67 | 2024 |
| An expressive (zero-knowledge) set accumulator Y Zhang, J Katz, C Papamanthou 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 158-173, 2017 | 50 | 2017 |
| Polynomial commitment with a {One-to-Many} prover and applications J Zhang, T Xie, T Hoang, E Shi, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 2965-2982, 2022 | 42 | 2022 |