Jae Hong Seo

Orcid: 0000-0003-0547-5702

According to our database1, Jae Hong Seo authored at least 53 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the Security of Nova Recursive Proof System.
IACR Cryptol. ePrint Arch., 2024

2023
On the security of functional encryption in the generic group model.
Des. Codes Cryptogr., September, 2023

Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption.
IEEE Trans. Inf. Forensics Secur., 2023

TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup.
IACR Cryptol. ePrint Arch., 2023

TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup.
Proceedings of the Advances in Information and Computer Security, 2023

Security Analysis on Locality-Sensitive Hashing-based Biometric Template Protection Schemes.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
Analysis on Secure Triplet Loss.
IEEE Access, 2022

Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger.
IEEE Access, 2022

Monitoring Provenance of Delegated Personal Data with Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022

Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Efficient revocable identity-based encryption with short public parameters.
Theor. Comput. Sci., 2021

Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier.
IACR Cryptol. ePrint Arch., 2021

Efficient Sum-Check Protocol for Convolution.
IEEE Access, 2021

IronMask: Modular Architecture for Protecting Deep Face Template.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Efficient digital signatures from RSA without random oracles.
Inf. Sci., 2020

Public key encryption with equality test in the standard model.
Inf. Sci., 2020

Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020

2019
A new approach to practical function-private inner product encryption.
Theor. Comput. Sci., 2019

Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019

2018
A new scale-invariant homomorphic encryption scheme.
Inf. Sci., 2018

Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018

2017
Short Signatures from Diffie-Hellman: Realizing Almost Compact Public Key.
J. Cryptol., 2017

A New Approach for Practical Function-Private Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2017

2016
Revocable hierarchical identity-based encryption via history-free approach.
Theor. Comput. Sci., 2016

Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016

Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016

CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016

2015
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency.
IACR Cryptol. ePrint Arch., 2015

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption.
Proceedings of the Advances in Information and Computer Security, 2015

Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Proceedings of the Topics in Cryptology, 2015

2014
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions.
IEEE Trans. Inf. Forensics Secur., 2014

Revocable hierarchical identity-based encryption.
Theor. Comput. Sci., 2014

Revocable Identity-Based Encryption with Rejoin Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction.
IACR Cryptol. ePrint Arch., 2014

Security Analysis of Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2014

A New Additive Homomorphic Encryption based on the co-ACD Problem.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
On Discrete Logarithm Based Additively Homomorphic Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Remark on " Efficient Revocable ID-Based Encryption with a Public Channel".
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013

Revocable Identity-Based Encryption Revisited: Security Model and Construction.
IACR Cryptol. ePrint Arch., 2013

On the (Im)possibility of Projecting Property in Prime-Order Setting.
IACR Cryptol. ePrint Arch., 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013

2012
Short Round Sub-Linear Zero-Knowledge Argument for Linear Algebraic Relations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2012

Short Signatures From Diffie-Hellman: Realizing Short Public Key.
IACR Cryptol. ePrint Arch., 2012

Constant-Round Multi-party Private Set Union Using Reversed Laurent Series.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011

Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2009
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2009

2006
Analysis of Privacy-Preserving Element Reduction of Multiset.
IACR Cryptol. ePrint Arch., 2006


  Loading...