Suivre
Hyung Tae Lee
Hyung Tae Lee
Adresse e-mail validée de cau.ac.kr - Page d'accueil
Titre
Citée par
Citée par
Année
Semi-generic construction of public key encryption and identity-based encryption with equality test
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 373, 419-440, 2016
842016
A Provably Secure Group Signature Scheme from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
Advances in Cryptology–ASIACRYPT 2015, 260-285, 2015
78*2015
Public key encryption with equality test in the standard model
HT Lee, S Ling, JH Seo, H Wang, TY Youn
Information Sciences 516, 89-108, 2020
752020
Method and system for ID-based encryption and decryption
HJ Yoon, JH Sohn, SY Lee, HT Lee, JH Cheon
US Patent 9,379,891, 2016
562016
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
512019
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
BHM Tan, HT Lee, H Wang, SQ Ren, AMM Khin
IEEE Transactions on Dependable and Secure Computing, 2020
472020
On the efficiency of FHE-based private queries
M Kim, HT Lee, S Ling, H Wang
IEEE Transactions on Dependable and Secure Computing, 2016
432016
Security analysis of multilinear maps over the integers
HT Lee, JH Seo
Advances in Cryptology–CRYPTO 2014, 224-240, 2014
362014
Private Compound Wildcard Queries using Fully Homomorphic Encryption
M Kim, HT Lee, S Ling, BHM Tan, H Wang
IEEE Transactions on Dependable and Secure Computing, 2017
352017
Mutual private set intersection with linear complexity
M Kim, HT Lee, JH Cheon
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
322012
Provably Secure Group Signature Schemes from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
IEEE Transactions on Information Theory, 2020
252020
CCA2 Attack and Modification of Huang et al.’s Public Key Encryption with Authorized Equality Test
HT Lee, S Ling, JH Seo, H Wang
The Computer Journal 59 (11), 1689-1694, 2016
242016
Better Security for Queries on Encrypted Databases.
M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang
IACR Cryptology ePrint Archive 2016, 470, 2016
232016
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
HT Lee, JH Cheon, J Hong
Cryptology ePrint Archive, Report 2011/187, 2011
192011
Public key encryption with equality test from generic assumptions in the random oracle model
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 500, 15-33, 2019
182019
Security analysis and modification of ID-based encryption with equality test from ACISP 2017
HT Lee, H Wang, K Zhang
Australasian Conference on Information Security and Privacy, 780-786, 2018
172018
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
KMM Aung, HT Lee, BHM Tan, H Wang
Theoretical Computer Science 771, 49-70, 2019
152019
A New Additive Homomorphic Encryption based on the co-ACD Problem
JH Cheon, HT Lee, JH Seo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
152014
IronMask: Modular architecture for protecting deep face template
S Kim, Y Jeong, J Kim, J Kim, HT Lee, JH Seo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
142021
Correcting errors in private keys obtained from cold boot attacks
HT Lee, HT Kim, YJ Baek, JH Cheon
Information Security and Cryptology-ICISC 2011, 74-87, 2011
142011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20