Publications


Journal articles

  1. Private compound wildcard queries using fully homomorphic encryption
    Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, and Huaxiong Wang
    Accepted for publication in IEEE Transactions on Dependable and Secure Computing, Oct 2017.

     

  2. Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
    Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, and Huaxiong Wang
    Theoretical Computer Science, Vol. 771, pp. 49-70, Elsevier, Jun 2019.

     

  3. Efficient public key encryption with equality test in the standard model
    Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, and Huaxiong Wang
    Theoretical Computer Science, Vol. 755, pp. 65-80, Elsevier, Jan 2019.

     

  4. On the efficiency of FHE-based private queries
    Myungsun Kim, Hyung Tae Lee, San Ling, and Huaxiong Wang
    IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 2, pp. 357-363, IEEE Computer Society, Mar 2018.
    [ePrint]
  5.  

  6. Semi-generic construction of public key encryption and identity-based encryption with equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    Information Sciences, Vol. 373, pp. 419-440, Elsevier, Dec 2016.

     

  7. CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    The Computer Journal, Vol. 59, No. 11, pp. 1689-1694, Oxford University Press, Nov 2016.

     

  8. Analysis of Gong et al.’s CCA2-secure homomorphic encryption
    Hyung Tae Lee, San Ling, and Huaxiong Wang
    Theoretical Computer Science, Vol. 640, pp. 104-114, Elsevier, Aug 2016.
    [ePrint]
  9.  

  10. A generalization of Agrawal et al.’s protocol for N-party private set intersection over dynamic datasets
    Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
    Journal of Internet Technology, Vol. 13, No. 6, pp. 909-918, Taiwan Acamedic Network, Nov 2012.
  11.  




Articles in refereed conferences and workshops

  1. Security analysis and modification of ID-based encryption with equality test from ACISP 2017
    Hyung Tae Lee, Huaxiong Wang, and Kai Zhang
    In W. Susilo and G. Yang (Eds.), ACISP 2018, LNCS vol. 10946, Springer, 2018, pp. 780-786.
    [ePrint] [Slide]

     

  2. A provably secure group signature scheme from code-based assumptions
    Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
    In T. Iwata and J. H. Cheon (Eds.), ASIACRYPT 2015, LNCS vol. 9452, Springer, 2015, pp.260-285.
    [ePrint]
  3.  

  4. A new additive homomorphic encryption based on the co-ACD problem
    Jung Hee Cheon, Hyung Tae Lee and Jae Hong Seo
    In M. Yung and N. Li (Eds.), ACM CCS 2014, ACM Press, 2014, pp.287-298.
    [Slide]

     

  5. Security analysis of multilinear maps over the integers
    Hyung Tae Lee and Jae Hong Seo
    In J. Garay and R. Gennaro (Eds.), CRYPTO 2014, LNCS vol. 8616, Springer, 2014, pp. 224-240.
    [ePrint]

     

  6. Invertible polynomial representation for private set operations
    Jung Hee Cheon, Hyunsook Hong and Hyung Tae Lee
    In H.-S. Lee and D. -G. Han (Eds.), ICISC 2013, LNCS vol. 8565, Springer, 2013, pp. 277-292.
    [ePrint] [Slide]
  7.  

  8. Correcting errors in private keys obtained from cold boot attacks
    Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
    In H. Kim (Ed.), ICISC 2011, LNCS vol. 7259, Springer, 2011. pp. 74-87.
    [Slide]

     

  9. Mutual private set intersection with linear complexity
    Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
    In S. Jung and M. Yung (Eds.), WISA 2011, LNCS vol. 7115, Springer, 2011, pp. 219-231.
    [ePrint]
  10.  




Other Manuscripts

  1. Better security for queries on encrypted databases
    Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, and Huaxiong Wang
    [ePrint]
  2.  

  3. Accelerating ID-based encryption based on trapdoor DL using pre-computation
    Hyung Tae Lee, Jung Hee Cheon and Jin Hong
    [ePrint]