Haixia Xu

Affiliations:
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Haixia Xu authored at least 25 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptively Secure Constrained Verifiable Random Function.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

2022
A Conflict-Free Redactable Blockchain.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Generic Construction of (Hierarchical) Functional Pseudorandom Functions.
Proceedings of the CCRIS 2022: 3rd International Conference on Control, Robotics and Intelligent System, Virtual Event, China, August 26, 2022

2021
An efficient identity tracing scheme for blockchain-based systems.
Inf. Sci., 2021

A Traceable Scheme for Consortium Blockchain.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A Blockchain Traceable Scheme with Oversight Function.
IACR Cryptol. ePrint Arch., 2020

SkyEye: A Traceable Scheme for Blockchain.
IACR Cryptol. ePrint Arch., 2020

Secure two-party SM9 signing.
Sci. China Inf. Sci., 2020

2017
A User-Friendly Centrally Banked Cryptocurrency.
Proceedings of the Information Security Practice and Experience, 2017

2015
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes.
Int. J. Inf. Comput. Secur., 2015

Multi-input Functional Encryption and Its Application in Outsourcing Computation.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Multi-client Outsourced Computation.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Private Outsourcing of Polynomial Functions.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Verifiable Computation of Large Polynomials.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Public Verification of Outsourced Computation of Polynomial Functions.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Homomorphic Signatures for Correct Computation of Group Elements.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Universally composable zero-knowledge sets.
Int. J. Grid Util. Comput., 2012

Non-malleable Instance-Dependent Commitment in the Standard Model.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.
Proceedings of the Provable Security - 5th International Conference, 2011

2010
On constant-round zero-knowledge proofs of knowledge for NP-relations.
Sci. China Inf. Sci., 2010

A New Efficient Construction for Non-Malleable Zero-Knowledge Sets.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2007
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme.
J. Comput. Sci. Technol., 2007

An Efficient Scheme for User Authentication in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Efficient reduction of 1 out of n oblivious transfers in random oracle model.
IACR Cryptol. ePrint Arch., 2005


  Loading...