Cryptanalysis and Modifications of Yang et al.'s Certificatelsss Multi-User Matchmaking Encryption Scheme
Jiseung Kim and Hyung Tae Lee
IEEE Access, Vol. 13, pp. 160887-160893, Sep 2025.
A Brief Survey of Two Recent Polynomial Commitment Schemes from Lattices
Minuk Ban and Hyung Tae Lee
Accepted at ICTC 2025, Sep 2025.
Comment on "RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare"
Jiseung Kim and Hyung Tae Lee
IEEE Transactions on Services Computing, Vol. 18, No. 5, pp. 3362-3363, Oct 2025.
An Efficient and Generic Construction of Public Key Encryption with Equality Test under the Random Oracle Model
Seongbong Choi, ChanHyeok Park, and Hyung Tae Lee
IEEE Access, Vol. 13, pp. 89411-89427, May 2025.
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing
Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy, and Hyung Tae Lee
Accepted at ESORICS 2025, Mar 2025.
Cryptanalysis and Modifications of Yang et al.'s Certificatelsss Multi-User Matchmaking Encryption Scheme
Jiseung Kim and Hyung Tae Lee
IEEE Access, Vol. 13, pp. 160887-160893, Sep 2025.
Comment on "RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare"
Jiseung Kim and Hyung Tae Lee
IEEE Transactions on Services Computing, Vol. 18, No. 5, pp. 3362-3363, Oct 2025.
An Efficient and Generic Construction of Public Key Encryption with Equality Test under the Random Oracle Model
Seongbong Choi, ChanHyeok Park, and Hyung Tae Lee
IEEE Access, Vol. 13, pp. 89411-89427, May 2025.
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme
ChanHyeok Park, Sangrae Cho, Young-Seob Cho, Soohyung Kim, and Hyung Tae Lee
IEEE Access, Vol. 12, pp. 16462-16473, Jan 2024.
On the Security of Functional Encryption in the Generic Group Model
Hyung Tae Lee and Jae Hong Seo
Designs, Codes, and Cryptography, Vol. 91, pp. 3081-3114, Sep 2023.
Cryptanalysis of Zhu et al.'s Identity-Based Encryption with Equality Test without Random Oracles
Hyung Tae Lee
IEEE Access, Vol. 11, pp. 84533-84542, Aug 2023.
A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes
Myungsun Kim, Sangrae Cho, Seongbong Choi, Young-Seob Cho, Soohyung Kim, and Hyung Tae Lee
IEEE Access, Vol. 10, pp. 133206-133218, Dec 2022.
Attack and Improvement of the Recent Identity-Based Encryption with Authorized Equivalence Test in Cluster Computing
Seongbong Choi and Hyung Tae Lee
Cluster Computing, Vol. 25, pp. 633-646, Feb 2022.
Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields
Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shuqin Ren, and Khin Mi Mi Aung
IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2861-2874, Nov. 2021.
Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, and Huaxiong Wang
IEEE Transactions on Information Theory, Vol. 66, No. 9, pp. 5754-5773, Sep 2020.
Public Key Encryption with Equality Test in the Standard Model
Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang, and Taek-Young Youn
Information Sciences, Vol. 516, pp.89-108, Apr 2020.
Search Condition-Hiding Query Evaluation on Encrypted Databases
Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, and Huaxiong Wang
IEEE Access, Vol. 7, pp. 161283-161295, Dec 2019.
Experimenting with Non-Interactive Range Proofs Based on the Strong RSA Assumption
Myungsun Kim and Hyung Tae Lee
IEEE Access, Vol. 7, pp. 117505-117516, Dec 2019.
Public Key Encryption with Equality Test from Generic Assumptions in the Random Oracle Model
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
Information Sciences, Vol. 500, pp. 15-33, Oct 2019.
Private Compound Wildcard Queries using Fully Homomorphic Encryption
Myungsun Kim, Hyung Tae Lee, San Ling, Benjamin Hong Meng Tan, and Huaxiong Wang
IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 5, pp. 743-756, Sep 2019.
Fully Homomorphic Encryption over the Integers for Non-Binary Plaintexts
Khin Mi Mi Aung, Hyung Tae Lee, Benjamin Hong Meng Tan, and Huaxiong Wang
Theoretical Computer Science, Vol. 771, pp. 49-70, Jun 2019.
Efficient Public Key Encryption with Equality Test in the Standard Model
Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, and Huaxiong Wang
Theoretical Computer Science, Vol. 755, pp. 65-80, Jan 2019.
On the Efficiency of FHE-Based Private Queries
Myungsun Kim, Hyung Tae Lee, San Ling, and Huaxiong Wang
IEEE Transactions on Dependable and Secure Computing, Vol. 15, No.2, pp. 357-363, Mar 2018.
Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
Information Sciences, Vol. 373, pp. 419-440, Dec 2016.
CCA2 Attack and Modification of Huang et al.'s Public key Encryption with Authorized Equality Test
Hyung Tae Lee, San Ling, Jae Hong Seo, and Huaxiong Wang
The Computer Journal, Vol. 59, No. 11, pp. 1689-1694, Nov 2016.
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption
Hyung Tae Lee, San Ling, and Huaxiong Wang
Theoretical Computer Science, Vol. 640, pp. 104-114, Aug 2016.
A Generalization of Agrawal et al.'s Protocol for n-Party Private Set Intersection
Myungsun Kim, Hyung Tae Lee, and Jung Hee Cheon
Journal of Internet Technology, Vol. 13, No. 6, pp. 909-918, Nov 2012.
A Brief Survey of Two Recent Polynomial Commitment Schemes from Lattices
Minuk Ban and Hyung Tae Lee
Accepted at ICTC 2025, Sep 2025.
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing
Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy, and Hyung Tae Lee
Accepted at ESORICS 2025, Mar 2025.
A Survey of Blind Sorting Techniques: Approaches Using Fully Homomorphic Encryption
Seunghu Kim, Yongseok Son, Jeongyeup Paek, Sungrae Cho, and Hyung Tae Lee
ICTC 2024, pp. 480-485, Oct 2024.
A Survey of Oblivious Compression on Encrypted Data with Fully Homomorphic Encryption
ChanHyeok Park, Yongseok Son, Jeongyeup Paek, Sungrae Cho, and Hyung Tae Lee
ICTC 2024, pp. 474-479, Oct 2024.
New RSA-Based Public Key Encryption with Authorized Equality Test
ChanHyeok Park, Seongbong Choi, Yongseok Son, Jeongyeup Paek, Sungrae Cho, and Hyung Tae Lee
ICOIN 2024, pp. 299-304, Jan 2024.
Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes
Seongbong Choi, Yongseok Son, Jeongyeup Paek, and Hyung Tae Lee
ICTC 2023, pp. 669-674, Oct 2023.
Code-Based Secret Handshake Scheme, Revisited
Minkyu Kim and Hyung Tae Lee
ESORICS 2023 Part I, pp. 106-125, Sep 2023.
Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme
Seongbong Choi and Hyung Tae Lee
ICTC 2022, pp. 1154-1157, Oct 2022.
IronMask: Modular Architecture for Protecting Deep Face Template
Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and Jae Hong Seo
CVPR 2021, pp. 16125-16134, Jun 2021.
Security Analysis and Modification of Identity-Based Encryption with Equality Test from ACISP 2017
Hyung Tae Lee, Huaxiong Wang, and Kai Zhang
ACISP 2018, pp. 780-786, Jul 2018.
A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, and Huaxiong Wang
ASIACRYPT Part I, pp. 260-285, Dec 2015.
A New Additive Homomorphic Encryption based on the co-ACD Problem
Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo
ACM CCS 2014, pp. 287-298, Nov 2014.
Security Analysis of Multilinear Maps over the Integers
Hyung Tae Lee and Jae Hong Seo
CRYPTO 2014 Part I, pp. 224-240, Aug 2014.
Invertible Polynomial Representation for Private Set Operations
Jung Hee Cheon, Hyunsook Hong, and Hyung Tae Lee
ICISC 2013, pp. 277-292, Nov. 2013.
Correcting Errors in Private Keys Obtained from Cold Boot Attacks
Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, and Jung Hee Cheon
ICISC 2011, pp. 74-89, Nov. 2011.
Mutual Private Set Intersection with Linear Complexity
Myungsun Kim, Hyung Tae Lee, and Jung Hee Cheon
WISA 2011, pp. 219-231, Aug 2012.