Secureml: A system for scalable privacy-preserving machine learning P Mohassel, Y Zhang 2017 IEEE symposium on security and privacy (SP), 19-38, 2017 | 2232 | 2017 |
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption Y Zhang, J Katz, C Papamanthou 25th USENIX Security Symposium (USENIX Security 16), 707-720, 2016 | 601 | 2016 |
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation T Xie, J Zhang, Y Zhang, C Papamanthou, D Song Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 259 | 2019 |
vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou 2017 IEEE Symposium on Security and Privacy (SP), 863-880, 2017 | 233 | 2017 |
Transparent polynomial delegation and its applications to zero knowledge proof J Zhang, T Xie, Y Zhang, D Song 2020 IEEE Symposium on Security and Privacy (SP), 859-876, 2020 | 185 | 2020 |
IntegriDB: Verifiable SQL for outsourced databases Y Zhang, J Katz, C Papamanthou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 153 | 2015 |
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy T Liu, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 142 | 2021 |
zkbridge: Trustless cross-chain bridges made practical T Xie, J Zhang, Z Cheng, F Zhang, Y Zhang, Y Jia, D Boneh, D Song Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 130 | 2022 |
CHURP: dynamic-committee proactive secret sharing SKD Maram, F Zhang, L Wang, A Low, Y Zhang, A Juels, D Song Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 111 | 2019 |
Ligero++: A new optimized sublinear IOP R Bhadauria, Z Fang, C Hazay, M Venkitasubramaniam, T Xie, Y Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 91 | 2020 |
Zero knowledge proofs for decision tree predictions and accuracy J Zhang, Z Fang, Y Zhang, D Song Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 90 | 2020 |
vRAM: Faster verifiable RAM with program-independent preprocessing Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou 2018 IEEE Symposium on Security and Privacy (SP), 908-925, 2018 | 90 | 2018 |
Orion: Zero knowledge proof with linear prover time T Xie, Y Zhang, D Song Annual International Cryptology Conference, 299-328, 2022 | 87 | 2022 |
Edrax: A cryptocurrency with stateless transaction validation A Chepurnoy, C Papamanthou, S Srinivasan, Y Zhang Cryptology ePrint Archive, 2018 | 79 | 2018 |
A zero-knowledge version of vSQL Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou Cryptology ePrint Archive, 2017 | 77 | 2017 |
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time J Zhang, T Liu, W Wang, Y Zhang, D Song, X Xie, Y Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 55 | 2021 |
Hyperproofs: Aggregating and maintaining proofs in vector commitments S Srinivasan, A Chepurnoy, C Papamanthou, A Tomescu, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 3001-3018, 2022 | 48 | 2022 |
Alitheia: Towards practical verifiable graph processing Y Zhang, C Papamanthou, J Katz Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 39 | 2014 |
An expressive (zero-knowledge) set accumulator Y Zhang, J Katz, C Papamanthou 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 158-173, 2017 | 38 | 2017 |
Streaming authenticated data structures: Abstraction and implementation Y Qian, Y Zhang, X Chen, C Papamanthou Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 23 | 2014 |