Semi-generic construction of public key encryption and identity-based encryption with equality test HT Lee, S Ling, JH Seo, H Wang Information Sciences 373, 419-440, 2016 | 84 | 2016 |
A Provably Secure Group Signature Scheme from Code-Based Assumptions MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang Advances in Cryptology–ASIACRYPT 2015, 260-285, 2015 | 77* | 2015 |
Public key encryption with equality test in the standard model HT Lee, S Ling, JH Seo, H Wang, TY Youn Information Sciences 516, 89-108, 2020 | 73 | 2020 |
Method and system for ID-based encryption and decryption HJ Yoon, JH Sohn, SY Lee, HT Lee, JH Cheon US Patent 9,379,891, 2016 | 56 | 2016 |
Efficient public key encryption with equality test in the standard model K Zhang, J Chen, HT Lee, H Qian, H Wang Theoretical Computer Science 755, 65-80, 2019 | 50 | 2019 |
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields BHM Tan, HT Lee, H Wang, SQ Ren, AMM Khin IEEE Transactions on Dependable and Secure Computing, 2020 | 46 | 2020 |
On the efficiency of FHE-based private queries M Kim, HT Lee, S Ling, H Wang IEEE Transactions on Dependable and Secure Computing, 2016 | 43 | 2016 |
Security analysis of multilinear maps over the integers HT Lee, JH Seo Advances in Cryptology–CRYPTO 2014, 224-240, 2014 | 36 | 2014 |
Private Compound Wildcard Queries using Fully Homomorphic Encryption M Kim, HT Lee, S Ling, BHM Tan, H Wang IEEE Transactions on Dependable and Secure Computing, 2017 | 34 | 2017 |
Mutual private set intersection with linear complexity M Kim, HT Lee, JH Cheon Information Security Applications: 12th International Workshop, WISA 2011 …, 2012 | 32 | 2012 |
Provably Secure Group Signature Schemes from Code-Based Assumptions MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang IEEE Transactions on Information Theory, 2020 | 24 | 2020 |
CCA2 Attack and Modification of Huang et al.’s Public Key Encryption with Authorized Equality Test HT Lee, S Ling, JH Seo, H Wang The Computer Journal 59 (11), 1689-1694, 2016 | 24 | 2016 |
Better Security for Queries on Encrypted Databases. M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang IACR Cryptology ePrint Archive 2016, 470, 2016 | 24 | 2016 |
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation HT Lee, JH Cheon, J Hong Cryptology ePrint Archive, Report 2011/187, 2011 | 18 | 2011 |
Public key encryption with equality test from generic assumptions in the random oracle model HT Lee, S Ling, JH Seo, H Wang Information Sciences 500, 15-33, 2019 | 17 | 2019 |
Security analysis and modification of ID-based encryption with equality test from ACISP 2017 HT Lee, H Wang, K Zhang Australasian Conference on Information Security and Privacy, 780-786, 2018 | 17 | 2018 |
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem KMM Aung, HT Lee, BHM Tan, H Wang Theoretical Computer Science 771, 49-70, 2019 | 15 | 2019 |
A New Additive Homomorphic Encryption based on the co-ACD Problem JH Cheon, HT Lee, JH Seo Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 15 | 2014 |
Correcting errors in private keys obtained from cold boot attacks HT Lee, HT Kim, YJ Baek, JH Cheon Information Security and Cryptology-ICISC 2011, 74-87, 2011 | 14 | 2011 |
IronMask: Modular architecture for protecting deep face template S Kim, Y Jeong, J Kim, J Kim, HT Lee, JH Seo Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 12 | 2021 |