Publications

Journal articles

  1. Private compound wildcard queries using fully homomorphic encryption
    Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, and Huaxiong Wang
    Accepted for publication in IEEE Transactions on Dependable and Secure Computing, Oct 2017.

  2. On the efficiency of FHE-based private queries
    Myungsun Kim, Hyung Tae Lee, San Ling, and Huaxiong Wang
    Accepted for publication in IEEE Transactions on Dependable and Secure Computing, May 2016.
    [ePrint]
  3. Semi-generic construction of public key encryption and identity-based encryption with equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    Information Sciences, Vol. 373, Elsevier, Dec 2016, pp. 419-440.

  4. CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test
    Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
    The Computer Journal, Vol. 59, No. 11, Oxford University Press, Nov 2016, pp. 1689-1694.

  5. Analysis of Gong et al.’s CCA2-secure homomorphic encryption
    Hyung Tae Lee, San Ling, and Huaxiong Wang
    Theoretical Computer Science, Vol. 640, Elsevier, Aug 2016, pp. 104-114.
    [ePrint]
  6. A generalization of Agrawal et al.’s protocol for N-party private set intersection over dynamic datasets
    Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
    Journal of Internet Technology, Vol. 13, No. 6, Taiwan Acamedic Network, Nov 2012, pp. 909-918.

 


 Articles in refereed conferences and workshops

      1. A provably secure group signature scheme from code-based assumptions
        Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
        In T. Iwata and J. H. Cheon (Eds.), ASIACRYPT 2015, LNCS vol. 9452, Springer, 2015, pp.260-285.
        [ePrint]
      2. A new additive homomorphic encryption based on the co-ACD problem
        Jung Hee Cheon, Hyung Tae Lee and Jae Hong Seo
        In M. Yung and N. Li (Eds.), ACM CCS 2014, ACM Press, 2014, pp.287-298.
        [Slide]

      3. Security analysis of multilinear maps over the integers
        Hyung Tae Lee and Jae Hong Seo
        In J. Garay and R. Gennaro (Eds.), CRYPTO 2014, LNCS vol. 8616, Springer, 2014, pp. 224-240.
        [ePrint]

      4. Invertible polynomial representation for private set operations
        Jung Hee Cheon, Hyunsook Hong and Hyung Tae Lee
        In H.-S. Lee and D. -G. Han (Eds.), ICISC 2013, LNCS vol. 8565, Springer, 2013, pp. 277-292.
        [ePrint] [Slide]
      5. Correcting errors in private keys obtained from cold boot attacks
        Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
        In H. Kim (Ed.), ICISC 2011, LNCS vol. 7259, Springer, 2011. pp. 74-87.
        [Slide]

      6. Mutual private set intersection with linear complexity
        Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
        In S. Jung and M. Yung (Eds.), WISA 2011, LNCS vol. 7115, Springer, 2011, pp. 219-231.
        [ePrint]

 


Other Manuscripts

      1. Better security for queries on encrypted databases
        Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, and Huaxiong Wang
        [ePrint]
      2. Accelerating ID-based encryption based on trapdoor DL using pre-computation
        Hyung Tae Lee, Jung Hee Cheon and Jin Hong
        [ePrint]