Journal Articles
-
A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes
Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, and Hyung Tae Lee IEEE Access, Vol. 10, No. 1, pp. 13320 – 133218, IEEE, Dec 2022.
-
Attack and Improvement of the Recent Identity-Based Encryption with Authorized Equivalence Test in Cluster Computing
Seongbong Choi and Hyung Tae Lee Cluster Computing, Vol. 25, pp. 633-646, Springer, Feb 2022.
-
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, and Khin Mi Mi Aung
IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2861-2874, IEEE, Nov 2021.
- Provably secure group signature schemes from code-based assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
IEEE Transactions on Information Theory, Vol. 66, No. 9, pp. 5754-5773, IEEE, Sep 2020.
The extended version of our Asiacrypt 2015 paper [ELL+15]
[arXiv] - Public key encryption with equality test in the standard model
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, and Taek-Young Youn
Information Sciences, Vol. 516, pp. 89-108, Elsevier, Apr 2020.
- Search condition-hiding query evaluation on encrypted databases
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, and Huaxiong Wang
IEEE Access, Vol. 7, No. 1, pp. 161283-161295, IEEE, Dec 2019.
An earlier version of this work with different title is available at [ePrint].
- Experimenting with non-interactive range proofs based on the strong RSA assumption
Myungsun Kim and Hyung Tae Lee
IEEE Access, Vol. 7, No. 1, pp. 117505-117516, IEEE, Dec 2019.
- Public key encryption with equality test from generic assumptions in the random oracle model
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
Information Sciences, Vol. 500, pp. 15-33, Elsevier, Oct 2019.
- Private compound wildcard queries using fully homomorphic encryption
Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, and Huaxiong Wang
IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 5, pp. 743-756, IEEE Computer Society, Sep 2019.
- Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, and Huaxiong Wang
Theoretical Computer Science, Vol. 771, pp. 49-70, Elsevier, Jun 2019.
- Efficient public key encryption with equality test in the standard model
Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, and Huaxiong Wang
Theoretical Computer Science, Vol. 755, pp. 65-80, Elsevier, Jan 2019.
- On the efficiency of FHE-based private queries
Myungsun Kim, Hyung Tae Lee, San Ling, and Huaxiong Wang
IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 2, pp. 357-363, IEEE Computer Society, Mar 2018.
[ePrint] - Semi-generic construction of public key encryption and identity-based encryption with equality test
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
Information Sciences, Vol. 373, pp. 419-440, Elsevier, Dec 2016.
- CCA2 attack and modification of Huang et al.’s public key encryption with authorized equality test
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
The Computer Journal, Vol. 59, No. 11, pp. 1689-1694, Oxford University Press, Nov 2016.
- Analysis of Gong et al.’s CCA2-secure homomorphic encryption
Hyung Tae Lee, San Ling, and Huaxiong Wang
Theoretical Computer Science, Vol. 640, pp. 104-114, Elsevier, Aug 2016.
[ePrint] - A generalization of Agrawal et al.’s protocol for N-party private set intersection over dynamic datasets
Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
Journal of Internet Technology, Vol. 13, No. 6, pp. 909-918, Taiwan Acamedic Network, Nov 2012.
Articles in refereed conferences and workshops
-
-
Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme
Seongbong Choi and Hyung Tae Lee
ICTC 2022, IEEE, 2022, pp. 1154-1157.
-
IronMask: Modular architecture for protecting deep face template
Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and Jae Hong Seo
CVPR 2021, pp. 16125-16134, 2021. - Security analysis and modification of ID-based encryption with equality test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang, and Kai Zhang
ACISP 2018, LNCS vol. 10946, Springer, 2018, pp. 780-786.
[ePrint] [Slide] - A provably secure group signature scheme from code-based assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen and Huaxiong Wang
ASIACRYPT 2015, LNCS vol. 9452, Springer, 2015, pp.260-285.
[ePrint] - A new additive homomorphic encryption based on the co-ACD problem
Jung Hee Cheon, Hyung Tae Lee and Jae Hong Seo
ACM CCS 2014, ACM Press, 2014, pp.287-298.
[Slide] - Security analysis of multilinear maps over the integers
Hyung Tae Lee and Jae Hong Seo
CRYPTO 2014, LNCS vol. 8616, Springer, 2014, pp. 224-240.
[ePrint] - Invertible polynomial representation for private set operations
Jung Hee Cheon, Hyunsook Hong and Hyung Tae Lee
ICISC 2013, LNCS vol. 8565, Springer, 2013, pp. 277-292.
[ePrint] [Slide] - Correcting errors in private keys obtained from cold boot attacks
Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek and Jung Hee Cheon
ICISC 2011, LNCS vol. 7259, Springer, 2011. pp. 74-87.
[Slide] - Mutual private set intersection with linear complexity
Myungsun Kim, Hyung Tae Lee and Jung Hee Cheon
WISA 2011, LNCS vol. 7115, Springer, 2011, pp. 219-231.
[ePrint]
Other Manuscripts
-
- Accelerating ID-based encryption based on trapdoor DL using pre-computation
Hyung Tae Lee, Jung Hee Cheon and Jin Hong
[ePrint]