Proxy re-encryption and re-signatures from lattices X Fan, FH Liu International Conference on Applied Cryptography and Network Security, 363-382, 2019 | 49* | 2019 |
Vector Encoding over Lattices and Its Applications. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2017, 455, 2017 | 47* | 2017 |
Adaptively Secure Fully Homomorphic Signatures Based on Lattices. X Boyen, X Fan, E Shi IACR Cryptol. ePrint Arch. 2014, 916, 2014 | 40 | 2014 |
FE for Inner Products and Its Application to Decentralized ABE Z Wang, X Fan, FH Liu IACR International Workshop on Public Key Cryptography, 97-127, 2019 | 33 | 2019 |
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols X Li, J Xu, X Fan, Y Wang, Z Zhang IEEE Transactions on Information Forensics and Security 15, 3872-3885, 2020 | 25 | 2020 |
Deniable attribute based encryption for branching programs from LWE D Apon, X Fan, FH Liu Theory of Cryptography Conference, 299-329, 2016 | 25* | 2016 |
EasyPQC: Verifying Post-Quantum Cryptography M Barbosa, G Barthe, X Fan, B Grégoire, SH Hung, J Katz, PY Strub, X Wu, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 23 | 2021 |
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More P Ananth, X Fan, E Shi International Conference on the Theory and Application of Cryptology and …, 2019 | 16* | 2019 |
Symbolic Proofs for Lattice-Based Cryptography G Barthe, X Fan, J Gancher, B Grégoire, C Jacomme, E Shi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 16 | 2018 |
A Core Calculus for Equational Proofs of Cryptographic Protocols J Gancher, K Sojakova, X Fan, E Shi, G Morrisett Proceedings of the ACM on Programming Languages 7 (POPL), 866-892, 2023 | 15* | 2023 |
Making Public Key Functional Encryption Function Private, Distributively X Fan, Q Tang IACR International Workshop on Public Key Cryptography, 218-244, 2018 | 10 | 2018 |
Hashing Garbled Circuits for Free X Fan, C Ganesh, V Kolesnikov Annual International Conference on the Theory and Applications of …, 2017 | 9 | 2017 |
Collusion-Resistant Functional Encryption for RAMs P Ananth, KM Chung, X Fan, L Qian Advances in Cryptology–ASIACRYPT 2022: 28th International Conference on the …, 2023 | 7 | 2023 |
Compact Inner Product Encryption from LWE Z Wang, X Fan, M Wang International Conference on Information and Communications Security, 141-153, 2017 | 4 | 2017 |
Non-interactive cryptography in the ram model of computation D Apon, X Fan, J Katz, FH Liu, E Shi, HS Zhou Cryptology ePrint Archive, Report 2014/154, 2014. http://eprint. iacr. org, 2014 | 4 | 2014 |
XCRYPT: Accelerating Lattice Based Cryptography with Memristor Crossbar Arrays S Singh, X Fan, AK Prasad, L Jia, A Nag, R Balasubramonian, ... IEEE Micro, 2023 | 3 | 2023 |
Short and Adjustable Signatures. X Fan, JA Garay, P Mohassel IACR Cryptol. ePrint Arch. 2016, 549, 2016 | 3 | 2016 |
Multi-input Laconic Function Evaluation B Pang, L Chen, X Fan, Q Tang Australasian Conference on Information Security and Privacy, 369-388, 2020 | 1 | 2020 |
Method and system for digital signature-based adjustable one-time passwords P Mohassel, J Garay, X Fan US Patent App. 15/063,752, 2017 | 1 | 2017 |
Hyena: Balancing Packing, Reuse, and Rotations for Encrypted Inference S Singh, S Singh, S Gudaparthi, X Fan, R Balasubramonian 2024 IEEE Symposium on Security and Privacy (SP), 107-107, 2024 | | 2024 |