


default search action
Haixia Xu 0002
Person information
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
Other persons with the same name
- Haixia Xu (aka: Hai-Xia Xu) — disambiguation page
- Hai-Xia Xu 0001
(aka: Haixia Xu 0001) — Xiangtan University, College of Information Engineering, China
- Haixia Xu 0003
(aka: Hai-Xia Xu 0003) — Tianjin University of Technology, School of Computer and Communication Engineering, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jinling Tang
, Haixia Xu
, Mingsheng Wang, Tao Tang
, Chunying Peng, Huimei Liao:
A Flexible and Scalable Malicious Secure Aggregation Protocol for Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 4174-4187 (2024) - 2023
- [c20]Yao Zan, Hongda Li, Haixia Xu:
Adaptively Secure Constrained Verifiable Random Function. SciSec 2023: 367-385 - [c19]Chunying Peng, Haixia Xu, Huimei Liao, Jinling Tang, Tao Tang:
Redactable Blockchain in the Permissioned Setting. SciSec 2023: 460-477 - 2022
- [c18]Yao Zan, Hongda Li, Xianning Meng, Haixia Xu:
Generic Construction of (Hierarchical) Functional Pseudorandom Functions. CCRIS 2022: 171-175 - [c17]Xianning Meng, Peifang Ni, Hongda Li, Haixia Xu:
A Conflict-Free Redactable Blockchain. PerCom Workshops 2022: 285-290 - [c16]Chunying Peng, Haixia Xu:
Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback. SciSec 2022: 68-84 - 2021
- [j6]Peili Li, Haixia Xu, Tianjun Ma:
An efficient identity tracing scheme for blockchain-based systems. Inf. Sci. 561: 130-140 (2021) - [c15]Huimei Liao, Haixia Xu, Peili Li:
The Golden Snitch: A Byzantine Fault Tolerant Protocol with Activity. ICICS (1) 2021: 3-21 - [c14]Tianjun Ma, Haixia Xu, Peili Li:
A Traceable Scheme for Consortium Blockchain. iSCI 2021: 39-46 - 2020
- [j5]Yongheng Mu, Haixia Xu, Peili Li, Tianjun Ma:
Secure two-party SM9 signing. Sci. China Inf. Sci. 63(8): 1-3 (2020) - [c13]Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. ICICS 2020: 164-182 - [i3]Tianjun Ma, Haixia Xu, Peili Li:
SkyEye: A Traceable Scheme for Blockchain. IACR Cryptol. ePrint Arch. 2020: 34 (2020) - [i2]Tianjun Ma, Haixia Xu, Peili Li:
A Blockchain Traceable Scheme with Oversight Function. IACR Cryptol. ePrint Arch. 2020: 311 (2020)
2010 – 2019
- 2017
- [c12]Xuan Han, Yamin Liu, Haixia Xu:
A User-Friendly Centrally Banked Cryptocurrency. ISPEC 2017: 25-42 - 2015
- [j4]Haixia Xu, Bao Li, Qixiang Mei:
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes. Int. J. Inf. Comput. Secur. 7(1): 14-38 (2015) - [c11]Peili Li, Haixia Xu, Yuanyuan Ji:
Multi-client Outsourced Computation. Inscrypt 2015: 397-409 - [c10]Peili Li, Haixia Xu, Yuanyuan Ji:
Multi-input Functional Encryption and Its Application in Outsourcing Computation. ICICS 2015: 220-235 - 2014
- [c9]Jiaqi Hong, Haixia Xu, Peili Li:
Verifiable Computation of Large Polynomials. INTRUST 2014: 90-104 - [c8]Peili Li, Haixia Xu, Jiaqi Hong:
Private Outsourcing of Polynomial Functions. TrustCom 2014: 61-68 - 2013
- [c7]Peili Li, Haixia Xu:
Homomorphic Signatures for Correct Computation of Group Elements. EIDWT 2013: 66-71 - [c6]Peili Li, Haixia Xu, Shu Guo:
Public Verification of Outsourced Computation of Polynomial Functions. TrustCom/ISPA/IUCC 2013: 776-780 - 2012
- [j3]Haixia Xu, Hongda Li, Bao Li:
Universally composable zero-knowledge sets. Int. J. Grid Util. Comput. 3(1): 25-31 (2012) - [c5]Wenpan Jing, Haixia Xu, Bao Li:
Non-malleable Instance-Dependent Commitment in the Standard Model. ACISP 2012: 450-457 - [c4]Haixia Xu, Bao Li, Qixiang Mei:
Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes. INCoS 2012: 270-278 - 2011
- [c3]Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu:
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. ProvSec 2011: 297-308 - 2010
- [j2]HongDa Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. Sci. China Inf. Sci. 53(4): 788-799 (2010) - [c2]Wenpan Jing, Haixia Xu, Bao Li:
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets. WISA 2010: 31-43
2000 – 2009
- 2007
- [j1]Haixia Xu, Bao Li:
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme. J. Comput. Sci. Technol. 22(1): 75-78 (2007) - [c1]Canming Jiang, Bao Li, Haixia Xu:
An Efficient Scheme for User Authentication in Wireless Sensor Networks. AINA Workshops (1) 2007: 438-442 - 2005
- [i1]Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptol. ePrint Arch. 2005: 279 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint