Jae Hong Seo

From MaRDI portal
Person:781007


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the security of functional encryption in the generic group model
Designs, Codes and Cryptography
2023-09-07Paper
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Public key encryption with equality test in the standard model
Information Sciences
2021-03-31Paper
Efficient revocable identity-based encryption with short public parameters
Theoretical Computer Science
2021-03-18Paper
Efficient digital signatures from RSA without random oracles
Information Sciences
2021-03-18Paper
Public key encryption with equality test from generic assumptions in the random oracle model
Information Sciences
2020-12-10Paper
A new scale-invariant homomorphic encryption scheme
Information Sciences
2020-07-16Paper
Semi-generic construction of public key encryption and identity-based encryption with equality test
Information Sciences
2020-02-06Paper
A new approach to practical function-private inner product encryption
Theoretical Computer Science
2019-08-13Paper
Adaptive-ID secure revocable hierarchical identity-based encryption
 
2018-10-24Paper
Short signatures from Diffie-Hellman: realizing almost compact public key
Journal of Cryptology
2017-10-12Paper
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Applied Cryptography and Network Security
2016-03-10Paper
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
Lecture Notes in Computer Science
2016-03-02Paper
Revocable hierarchical identity-based encryption via history-free approach
Theoretical Computer Science
2016-01-21Paper
Security analysis of multilinear maps over the integers
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Revocable hierarchical identity-based encryption
Theoretical Computer Science
2014-06-23Paper
Practical signatures from standard assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Revocable identity-based encryption revisited: security model and construction
Public-Key Cryptography – PKC 2013
2013-04-19Paper
On the (Im)possibility of projecting property in prime-order setting
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Efficient delegation of key generation and revocation functionalities in identity-based encryption
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
Public Key Cryptography – PKC 2012
2012-07-20Paper
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures
Theory of Cryptography
2012-06-15Paper
Round-efficient sub-linear zero-knowledge arguments for linear algebra
Public Key Cryptography – PKC 2011
2011-03-15Paper
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET
Journal of the Korean Mathematical Society
2009-05-05Paper
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Public Key Cryptography – PKC 2009
2009-03-24Paper


Research outcomes over time


This page was built for person: Jae Hong Seo