Jong Hwan Park
Orcid: 0000-0003-2742-6119
According to our database1,
Jong Hwan Park
authored at least 61 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Des. Codes Cryptogr., March, 2023
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).
IET Inf. Secur., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Access, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK.
IEEE Access, 2022
2021
Practical dynamic group signature with efficient concurrent joins and batch verifications.
J. Inf. Secur. Appl., 2021
Int. J. Inf. Sec., 2021
2020
Tight security for the generic construction of identity-based signature (in the multi-instance setting).
Theor. Comput. Sci., 2020
Neural Comput. Appl., 2020
Int. J. Inf. Sec., 2020
Des. Codes Cryptogr., 2020
IEEE Access, 2020
IEEE Access, 2020
2019
New technique for chosen-ciphertext security based on non-interactive zero-knowledge.
Inf. Sci., 2019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
Comput. J., 2019
IEEE Access, 2019
IEEE Access, 2019
2018
Secur. Commun. Networks, 2018
2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017
Des. Codes Cryptogr., 2017
2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015
Des. Codes Cryptogr., 2015
2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IEEE Trans. Inf. Theory, 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Inf. Sci., 2012
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012
2011
IEEE Trans. Knowl. Data Eng., 2011
J. Commun. Networks, 2011
Design and implementation of a seamless and comprehensive integrated medical device interface system for outpatient electronic medical records in a general hospital.
Int. J. Medical Informatics, 2011
Des. Codes Cryptogr., 2011
Comput. Math. Appl., 2011
2010
Trapdoor security in a searchable public-key encryption scheme with a designated tester.
J. Syst. Softw., 2010
A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
IEEE Trans. Broadcast., 2008
Proceedings of the Information Security Practice and Experience, 2008
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007