Jae Hong Seo

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the security of functional encryption in the generic group model
Designs, Codes and Cryptography
2023-09-07Paper
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Public key encryption with equality test in the standard model
Information Sciences
2021-03-31Paper
Efficient revocable identity-based encryption with short public parameters
Theoretical Computer Science
2021-03-18Paper
Efficient digital signatures from RSA without random oracles
Information Sciences
2021-03-18Paper
Public key encryption with equality test from generic assumptions in the random oracle model
Information Sciences
2020-12-10Paper
A new scale-invariant homomorphic encryption scheme
Information Sciences
2020-07-16Paper
Semi-generic construction of public key encryption and identity-based encryption with equality test
Information Sciences
2020-02-06Paper
A new approach to practical function-private inner product encryption
Theoretical Computer Science
2019-08-13Paper
Adaptive-ID secure revocable hierarchical identity-based encryption2018-10-24Paper
Short signatures from Diffie-Hellman: realizing almost compact public key
Journal of Cryptology
2017-10-12Paper
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Applied Cryptography and Network Security
2016-03-10Paper
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
Lecture Notes in Computer Science
2016-03-02Paper
Revocable hierarchical identity-based encryption via history-free approach
Theoretical Computer Science
2016-01-21Paper
Security analysis of multilinear maps over the integers
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Revocable hierarchical identity-based encryption
Theoretical Computer Science
2014-06-23Paper
Practical signatures from standard assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Revocable identity-based encryption revisited: security model and construction
Public-Key Cryptography – PKC 2013
2013-04-19Paper
On the (Im)possibility of projecting property in prime-order setting
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Efficient delegation of key generation and revocation functionalities in identity-based encryption
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
Public Key Cryptography – PKC 2012
2012-07-20Paper
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures
Theory of Cryptography
2012-06-15Paper
Round-efficient sub-linear zero-knowledge arguments for linear algebra
Public Key Cryptography – PKC 2011
2011-03-15Paper
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET
Journal of the Korean Mathematical Society
2009-05-05Paper
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Public Key Cryptography – PKC 2009
2009-03-24Paper


Research outcomes over time


This page was built for person: Jae Hong Seo