Jong Hwan Park

Orcid: 0000-0003-2742-6119

According to our database1, Jong Hwan Park authored at least 59 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Practical dynamic group signatures without knowledge extractors.
Des. Codes Cryptogr., March, 2023

Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).
IET Inf. Secur., January, 2023

NTRU++: Compact Construction of NTRU Using Simple Encoding Method.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK.
IEEE Access, 2023

2022
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks.
IACR Cryptol. ePrint Arch., 2022

An Efficient Open Vote Network for Multiple Candidates.
IEEE Access, 2022

Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK.
IEEE Access, 2022

2021
Practical dynamic group signature with efficient concurrent joins and batch verifications.
J. Inf. Secur. Appl., 2021

Improving the security of direct anonymous attestation under host corruptions.
Int. J. Inf. Sec., 2021

2020
Tight security for the generic construction of identity-based signature (in the multi-instance setting).
Theor. Comput. Sci., 2020

An efficient public key functional encryption for inner product evaluations.
Neural Comput. Appl., 2020

EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method.
Int. J. Inf. Sec., 2020

Tightly CCA-secure encryption scheme in a multi-user setting with corruptions.
Des. Codes Cryptogr., 2020

Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials.
IEEE Access, 2020

Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone.
IEEE Access, 2020

2019
New technique for chosen-ciphertext security based on non-interactive zero-knowledge.
Inf. Sci., 2019

Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication.
IEEE Access, 2019

Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions.
IEEE Access, 2019

2018
Construction of a New Biometric-Based Key Derivation Function and Its Application.
Secur. Commun. Networks, 2018

2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017

Efficient revocable identity-based encryption via subset difference methods.
Des. Codes Cryptogr., 2017

2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016

Selectively chosen ciphertext security in threshold public-key encryption.
Secur. Commun. Networks, 2016

A Tightly-Secure Multisignature Scheme with Improved Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Variant of Park-Lee Identity-Based Encryption System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptol. ePrint Arch., 2016

An efficient IBE scheme with tight security reduction in the random oracle model.
Des. Codes Cryptogr., 2016

2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Anonymous HIBE with short ciphertexts: full security in prime order groups.
Des. Codes Cryptogr., 2015

2014
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Anonymous HIBE: Compact Construction Over Prime-Order Groups.
IEEE Trans. Inf. Theory, 2013

Fully secure hidden vector encryption under standard assumptions.
Inf. Sci., 2013

Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A New Practical Identity-Based Encryption System.
IACR Cryptol. ePrint Arch., 2013

Public-Key Revocation and Tracing Schemes with Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2013

2012
Generic construction of designated tester public-key encryption with keyword search.
Inf. Sci., 2012

On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Attribute-Based Encryption for Commercial Content Distribution.
Proceedings of the International Conference on IT Convergence and Security, 2012

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012

2011
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data.
IEEE Trans. Knowl. Data Eng., 2011

Fully collusion-resistant trace-and-revoke scheme in prime-order groups.
J. Commun. Networks, 2011

Design and implementation of a seamless and comprehensive integrated medical device interface system for outpatient electronic medical records in a general hospital.
Int. J. Medical Informatics, 2011

Fully collusion-resistant traitor tracing scheme with shorter ciphertexts.
Des. Codes Cryptogr., 2011

Inner-product encryption under standard assumptions.
Des. Codes Cryptogr., 2011

A new provably secure certificateless short signature scheme.
Comput. Math. Appl., 2011

2010
Trapdoor security in a searchable public-key encryption scheme with a designated tester.
J. Syst. Softw., 2010

A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Improved searchable public key encryption with designated tester.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Public Key Broadcast Encryption Schemes With Shorter Transmissions.
IEEE Trans. Broadcast., 2008

A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme.
Proceedings of the Information Security Practice and Experience, 2008

Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Bogus Data Filtering in Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007

Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes.
Proceedings of the Public Key Infrastructure, 2007

Efficient Certificateless Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007


  Loading...