Selected Publications

For a full list of publications, see here.

  • Lightweight Authentication of Web Data via Garble-Then-Prove
    • Xiang Xie, Kang Yang, Xiao Wang, and Yu Yu
    • USENIX Security 2024. eprint.
  • Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
    • Fengrun Liu, Xiang Xie, and Yu Yu
    • USENIX Security 2024.
  • Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA
    • Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, and Chengru Zhang
    • ACM CCS 2023. eprint.
  • Half-Tree: Halving the Cost of Tree Expansion in COT and DPF
    • Xiaojie Guo, Kang Yang, Xiao Wang, Wenhao Zhang, Xiang Xie, Jiang Zhang, and Zheli Liu
    • EUROCRYPT 2023. eprint.
  • The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets
    • Chun Guo, Xiao Wang, Xiang Xie, and Yu Yu
    • ACM Transactions on Privacy and Security, 2023.
  • AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication
    • Chenkai Weng, Kang Yang, Zhaomin Yang, Xiang Xie, and Xiao Wang
    • ACM CCS 2022. eprint.
  • Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013
    • Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, and Shota Yamada
    • Designs, Codes and Cryptography 2022. eprint.
  • Promise $\Sigma$-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups
    • Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, and Xiang Xie
    • ASIACRYPT 2021. eprint.
  • Efficient Online-Friendly Two-Party ECDSA Signature
    • Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, and Handong Cui
    • ACM CCS 2021. eprint.
  • Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time
    • Jiaheng Zhang, Tianyi Liu, Weijie Wang, Yinuo Zhang, Dawn Song, Xiang Xie, and Yupeng Zhang
    • ACM CCS 2021. eprint.
  • ZkCNN: Zero-Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy
    • Tianyi Liu, Xiang Xie, and Yupeng Zhang
    • ACM CCS 2021. eprint.
  • Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup
    • Tsz Hon Yuen, Handong Cui, and Xiang Xie
    • PKC 2021. eprint.
  • Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
    • Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang
    • USENIX Security 2021. eprint.
  • LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction
    • Rui Wen, Yu Yu, Xiang Xie, and Yang Zhang
    • ACM CCS 2020. link.
  • Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
    • Nicolas Gama, Malika Izabachene, Phong Q Nguyen, and Xiang Xie
    • EUROCRYPT 2016. eprint.
  • Zero Knowledge Proofs from Ring-LWE
    • Xiang Xie, Rui Xue, and Minqian Wang
    • CANS 2013.
  • Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
    • Xiang Xie, Rui Xue, and Rui Zhang
    • SCN 2012 (Best Paper). eprint.

Preprint

  • TOTA: Fully Homomorphic Encryption with Smaller Parameters and Stronger Security
    • Zhaomin Yang, Xiang Xie, Huajie Shen, Shiying Chen, and Jun Zhou
    • 2021 eprint.
  • A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem
    • Jintai Ding, Xiang Xie, and Xiaodong Lin
    • 2012 eprint.