Filter
Conference contribution

Search results

  • 2023

    Private Polynomial Commitments and Applications to MPC

    Bhadauria, R., Hazay, C., Venkitasubramaniam, M., Wu, W. & Zhang, Y., 2023, Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Boldyreva, A. & Kolesnikov, V. (eds.). Springer, p. 127-158 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13941 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Proof-of-Contribution-Based Design for Collaborative Machine Learning on Blockchain

    Buyukates, B., He, C., Han, S., Fang, Z., Zhang, Y., Long, J., Farahanchi, A. & Avestimehr, S., 2023, Proceedings - 2023 IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2023. Institute of Electrical and Electronics Engineers Inc., p. 13-22 10 p. (Proceedings - 2023 IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2022

    Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments

    Srinivasan, S., Chepurnoy, A., Papamanthou, C., Tomescu, A. & Zhang, Y., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 3001-3018 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Orion: Zero Knowledge Proof with Linear Prover Time

    Xie, T., Zhang, Y. & Song, D., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer, p. 299-328 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Polynomial Commitment with a One-to-Many Prover and Applications

    Zhang, J., Xie, T., Hoang, T., Shi, E. & Zhang, Y., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 2965-2982 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • zkBridge: Trustless Cross-chain Bridges Made Practical

    Xie, T., Zhang, J., Cheng, Z., Zhang, F., Zhang, Y., Jia, Y., Boneh, D. & Song, D., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3003-3017 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time

    Zhang, J., Liu, T., Wang, W., Zhang, Y., Song, D., Xie, X. & Zhang, Y., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 159-177 19 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Zero Knowledge Static Program Analysis

    Fang, Z., Darais, D., Near, J. P. & Zhang, Y., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2951-2967 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • ZkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy

    Liu, T., Xie, X. & Zhang, Y., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2968-2985 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ZKCPlus: Optimized Fair-exchange Protocol Supporting Practical and Flexible Data Exchange

    Li, Y., Ye, C., Hu, Y., Morpheus, I., Guo, Y., Zhang, C., Zhang, Y., Sun, Z., Lu, Y. & Wang, H., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3002-3021 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    Ligero++: A New Optimized Sublinear IOP

    Bhadauria, R., Fang, Z., Hazay, C., Venkitasubramaniam, M., Xie, T. & Zhang, Y., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2025-2038 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Transparent polynomial delegation and its applications to zero knowledge proof

    Zhang, J., Xie, T., Zhang, Y. & Song, D., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 859-876 18 p. 9152704. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Zero Knowledge Proofs for Decision Tree Predictions and Accuracy

    Zhang, J., Fang, Z., Zhang, Y. & Song, D., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2039-2053 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2019

    ChURP: Dynamic-committee proactive secret sharing

    Zhang, F., Zhang, Y., Maram, S. K. D., Wang, L., Juels, A., Low, A. & Song, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2369-2386 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation

    Xie, T., Zhang, J., Zhang, Y., Papamanthou, C. & Song, D., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer, p. 733-764 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    VRAM: Faster Verifiable RAM with Program-Independent Preprocessing

    Zhang, Y., Genkin, D., Katz, J., Papadopoulos, D. & Papamanthou, C., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 908-925 18 p. 8418645. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2017

    An Expressive (Zero-Knowledge) Set Accumulator

    Zhang, Y., Katz, J. & Papamanthou, C., Jun 28 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017. Institute of Electrical and Electronics Engineers Inc., p. 158-173 16 p. 7961978. (Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SecureML: A System for Scalable Privacy-Preserving Machine Learning

    Mohassel, P. & Zhang, Y., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 19-38 20 p. 7958569. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • VSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases

    Zhang, Y., Genkin, D., Katz, J., Papadopoulos, D. & Papamanthou, C., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 863-880 18 p. 7958614. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    All your queries are belong to us: The power of file-injection attacks on searchable encryption

    Zhang, Y., Katz, J. & Papamanthou, C., 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 707-720 14 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient authenticated multi-pattern matching

    Zhou, Z., Zhang, T., Chow, S. S. M., Zhang, Y. & Zhang, K., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 593-604 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    ALITHEIA: Towards practical verifiable graph processing

    Zhang, Y., Papamanthou, C. & Katz, J., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 856-867 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Streaming authenticated data structures: Abstraction and implementation

    Qian, Y., Zhang, Y., Chen, X. & Papamanthou, C., Nov 7 2014, CCSW 2014 - Proceedings of the 2014 ACM Cloud Computing Security Workshop, Co-located with CCS 2014. November ed. Association for Computing Machinery, p. 129-139 11 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Distributed load balancing in a multiple server system by shift-invariant protocol sequences

    Zhang, Y. & Wong, W. S., 2013, 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013. p. 1639-1644 6 p. 6554809. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Failure of TCP congestion control under diversity routing

    Zhang, Y., Chapin, J. & Chan, V. W. S., 2011, 2011 IEEE Wireless Communications and Networking Conference, WCNC 2011. p. 569-574 6 p. 5779225. (2011 IEEE Wireless Communications and Networking Conference, WCNC 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution