New

  • Code-Based Secret Handshake Scheme, Revisited
    Minkyu Kim and Hyung Tae Lee
    To appear in ESORICS 2023, Apr 2023.

     




Journal Articles

  1. Cryptanalysis of Zhu et al.’s Identity-Based Encryption with Equality Test without Random Oracles
    Hyung Tae Lee
    IEEE Access, Vol. 11, No. 1, pp. 84533-84542, IEEE, Aug 2023.

     

  2. On the Security of Functional Encryption in the Generic Group Model
    Hyung Tae Lee and Jae Hong Seo
    Accepted for publication in Designs, Codes and Cryptography, Apr 2023.

     

  3. A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes
    Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, and Hyung Tae Lee
    IEEE Access, Vol. 10, No. 1, pp. 133206 – 133218, IEEE, Dec 2022.

     

  4. Attack and Improvement of the Recent Identity-Based Encryption with Authorized Equivalence Test in Cluster Computing
    Seongbong Choi and Hyung Tae Lee
    Cluster Computing, Vol. 25, pp. 633-646, Springer, Feb 2022.

     

  5. Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
    Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, and Khin Mi Mi Aung
    IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2861-2874, IEEE, Nov 2021.

     

  6. Provably secure group signature schemes from code-based assumptions
    Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
    IEEE Transactions on Information Theory, Vol. 66, No. 9, pp. 5754-5773, IEEE, Sep 2020.
    The extended version of our Asiacrypt 2015 paper [ELL+15]
    [arXiv]
  7.  

  8. Public key encryption with equality test in the standard model
    Hyung Tae Lee,
    San Ling, Jae Hong Seo, Huaxiong Wang, and Taek-Young Youn
    Information Sciences, Vol. 516, pp. 89-108, Elsevier, Apr 2020.

     

  9. Search condition-hiding query evaluation on encrypted databases
    Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, and Huaxiong Wang
    IEEE Access, Vol. 7, No. 1, pp. 161283-161295, IEEE, Dec 2019.
    An earlier version of this work with different title is available at [ePrint].

     

  10. Experimenting with non-interactive range proofs based on the strong RSA assumption
    Myungsun Kim and Hyung Tae Lee
    IEEE Access, Vol. 7, No. 1, pp. 117505-117516, IEEE, Dec 2019.

     

  11. Public key encryption with equality test from generic assumptions in the random oracle model
    Hyung Tae Lee,
    San Ling, Jae Hong Seo, and Huaxiong Wang
    Information Sciences, Vol. 500, pp. 15-33, Elsevier, Oct 2019.

     

  12. Private compound wildcard queries using fully homomorphic encryption
    Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, and Huaxiong Wang
    IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 5, pp. 743-756, IEEE Computer Society, Sep 2019.

     

  13. Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
    Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, and Huaxiong Wang
    Theoretical Computer Science, Vol. 771, pp. 49-70, Elsevier, Jun 2019.

     

  14. Efficient public key encryption with equality test in the standard model
    Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, and Huaxiong Wang
    Theoretical Computer Science, Vol. 755, pp. 65-80, Elsevier, Jan 2019.

     

  15. On the efficiency of FHE-based private queries
    Myungsun Kim, Hyung Tae Lee, San Ling, and Huaxiong Wang
    IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 2, pp. 357-363, IEEE Computer Society, Mar 2018.
    [ePrint]
  16.  

  17. Semi-generic construction of public key encryption and identity-based encryption with equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    Information Sciences, Vol. 373, pp. 419-440, Elsevier, Dec 2016.

     

  18. CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    The Computer Journal, Vol. 59, No. 11, pp. 1689-1694, Oxford University Press, Nov 2016.

     

  19. Analysis of Gong et al.’s CCA2-secure homomorphic encryption
    Hyung Tae Lee, San Ling, and Huaxiong Wang
    Theoretical Computer Science, Vol. 640, pp. 104-114, Elsevier, Aug 2016.
    [ePrint]
  20.  

  21. A generalization of Agrawal et al.’s protocol for N-party private set intersection over dynamic datasets
    Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
    Journal of Internet Technology, Vol. 13, No. 6, pp. 909-918, Taiwan Acamedic Network, Nov 2012.
  22.  




Articles in refereed conferences and workshops

  1.  

  2. Code-Based Secret Handshake Scheme, Revisited
    Minkyu Kim and Hyung Tae Lee
    To appear in ESORICS 2023, Apr 2023.

     

  3. Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme
    Seongbong Choi and Hyung Tae Lee
    ICTC 2022, IEEE, 2022, pp. 1154-1157.

     

  4. IronMask: Modular architecture for protecting deep face template
    Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and
    Jae Hong Seo
    CVPR 2021, pp. 16125-16134, 2021.
  5.  

  6. Security analysis and modification of ID-based encryption with equality test from ACISP 2017
    Hyung Tae Lee, Huaxiong Wang, and Kai Zhang
    ACISP 2018, LNCS vol. 10946, Springer, 2018, pp. 780-786.
    [ePrint] [Slide]

     

  7. A provably secure group signature scheme from code-based assumptions
    Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
    ASIACRYPT 2015, LNCS vol. 9452, Springer, 2015, pp.260-285.
    [ePrint]
  8.  

  9. A new additive homomorphic encryption based on the co-ACD problem
    Jung Hee Cheon, Hyung Tae Lee and Jae Hong Seo
    ACM CCS 2014, ACM Press, 2014, pp.287-298.
    [Slide]

     

  10. Security analysis of multilinear maps over the integers
    Hyung Tae Lee and Jae Hong Seo
    CRYPTO 2014, LNCS vol. 8616, Springer, 2014, pp. 224-240.
    [ePrint]

     

  11. Invertible polynomial representation for private set operations
    Jung Hee Cheon, Hyunsook Hong and Hyung Tae Lee
    ICISC 2013, LNCS vol. 8565, Springer, 2013, pp. 277-292.
    [ePrint] [Slide]
  12.  

  13. Correcting errors in private keys obtained from cold boot attacks
    Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
    ICISC 2011, LNCS vol. 7259, Springer, 2011. pp. 74-87.
    [Slide]

     

  14. Mutual private set intersection with linear complexity
    Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
    WISA 2011, LNCS vol. 7115, Springer, 2011, pp. 219-231.
    [ePrint]
  15.  




Other Manuscripts

  1.  

  2. Accelerating ID-based encryption based on trapdoor DL using pre-computation
    Hyung Tae Lee, Jung Hee Cheon and Jin Hong
    [ePrint]