关注
Hyung Tae Lee
Hyung Tae Lee
在 cau.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Semi-generic construction of public key encryption and identity-based encryption with equality test
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 373, 419-440, 2016
842016
A Provably Secure Group Signature Scheme from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
Advances in Cryptology–ASIACRYPT 2015, 260-285, 2015
77*2015
Public key encryption with equality test in the standard model
HT Lee, S Ling, JH Seo, H Wang, TY Youn
Information Sciences 516, 89-108, 2020
732020
Method and system for ID-based encryption and decryption
HJ Yoon, JH Sohn, SY Lee, HT Lee, JH Cheon
US Patent 9,379,891, 2016
562016
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
502019
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
BHM Tan, HT Lee, H Wang, SQ Ren, AMM Khin
IEEE Transactions on Dependable and Secure Computing, 2020
462020
On the efficiency of FHE-based private queries
M Kim, HT Lee, S Ling, H Wang
IEEE Transactions on Dependable and Secure Computing, 2016
432016
Security analysis of multilinear maps over the integers
HT Lee, JH Seo
Advances in Cryptology–CRYPTO 2014, 224-240, 2014
362014
Private Compound Wildcard Queries using Fully Homomorphic Encryption
M Kim, HT Lee, S Ling, BHM Tan, H Wang
IEEE Transactions on Dependable and Secure Computing, 2017
342017
Mutual private set intersection with linear complexity
M Kim, HT Lee, JH Cheon
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
322012
Provably Secure Group Signature Schemes from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
IEEE Transactions on Information Theory, 2020
242020
CCA2 Attack and Modification of Huang et al.’s Public Key Encryption with Authorized Equality Test
HT Lee, S Ling, JH Seo, H Wang
The Computer Journal 59 (11), 1689-1694, 2016
242016
Better Security for Queries on Encrypted Databases.
M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang
IACR Cryptology ePrint Archive 2016, 470, 2016
242016
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
HT Lee, JH Cheon, J Hong
Cryptology ePrint Archive, Report 2011/187, 2011
182011
Public key encryption with equality test from generic assumptions in the random oracle model
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 500, 15-33, 2019
172019
Security analysis and modification of ID-based encryption with equality test from ACISP 2017
HT Lee, H Wang, K Zhang
Australasian Conference on Information Security and Privacy, 780-786, 2018
172018
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
KMM Aung, HT Lee, BHM Tan, H Wang
Theoretical Computer Science 771, 49-70, 2019
152019
A New Additive Homomorphic Encryption based on the co-ACD Problem
JH Cheon, HT Lee, JH Seo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
152014
Correcting errors in private keys obtained from cold boot attacks
HT Lee, HT Kim, YJ Baek, JH Cheon
Information Security and Cryptology-ICISC 2011, 74-87, 2011
142011
IronMask: Modular architecture for protecting deep face template
S Kim, Y Jeong, J Kim, J Kim, HT Lee, JH Seo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
122021
系统目前无法执行此操作,请稍后再试。
文章 1–20