Jong Hwan Park

According to our database1, Jong Hwan Park
  • authored at least 45 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017

Efficient revocable identity-based encryption via subset difference methods.
Des. Codes Cryptography, 2017

2016
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.
IEEE Trans. Computers, 2016

Selectively chosen ciphertext security in threshold public-key encryption.
Security and Communication Networks, 2016

A Tightly-Secure Multisignature Scheme with Improved Verification.
IEICE Transactions, 2016

A Variant of Park-Lee Identity-Based Encryption System.
IEICE Transactions, 2016

Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptology ePrint Archive, 2016

An efficient IBE scheme with tight security reduction in the random oracle model.
Des. Codes Cryptography, 2016

2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015

Identity-Based Revocation from Subset Difference Methods under Simple Assumptions.
IACR Cryptology ePrint Archive, 2015

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
IACR Cryptology ePrint Archive, 2015

Anonymous HIBE with short ciphertexts: full security in prime order groups.
Des. Codes Cryptography, 2015

Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups.
CoRR, 2015

2014
Efficient Revocable Identity-Based Encryption via Subset Difference Methods.
IACR Cryptology ePrint Archive, 2014

Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Anonymous HIBE: Compact Construction Over Prime-Order Groups.
IEEE Trans. Information Theory, 2013

Fully secure hidden vector encryption under standard assumptions.
Inf. Sci., 2013

Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages.
IEICE Transactions, 2013

A New Practical Identity-Based Encryption System.
IACR Cryptology ePrint Archive, 2013

Public-Key Revocation and Tracing Schemes with Subset Difference Methods.
IACR Cryptology ePrint Archive, 2013

Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
IACR Cryptology ePrint Archive, 2013

Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Generic construction of designated tester public-key encryption with keyword search.
Inf. Sci., 2012

On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Transactions, 2012

Attribute-Based Encryption for Commercial Content Distribution.
Proceedings of the International Conference on IT Convergence and Security, 2012

Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption.
Proceedings of the Computer Applications for Database, Education, and Ubiquitous Computing, 2012

2011
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data.
IEEE Trans. Knowl. Data Eng., 2011

Fully collusion-resistant trace-and-revoke scheme in prime-order groups.
Journal of Communications and Networks, 2011

Design and implementation of a seamless and comprehensive integrated medical device interface system for outpatient electronic medical records in a general hospital.
I. J. Medical Informatics, 2011

Fully collusion-resistant traitor tracing scheme with shorter ciphertexts.
Des. Codes Cryptography, 2011

Inner-product encryption under standard assumptions.
Des. Codes Cryptography, 2011

A new provably secure certificateless short signature scheme.
Computers & Mathematics with Applications, 2011

2010
Trapdoor security in a searchable public-key encryption scheme with a designated tester.
Journal of Systems and Software, 2010

A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations.
IEICE Transactions, 2010

Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2010

2009
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06.
IEICE Transactions, 2009

Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism.
IEICE Transactions, 2009

Improved searchable public key encryption with designated tester.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Public Key Broadcast Encryption Schemes With Shorter Transmissions.
TBC, 2008

A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme.
Proceedings of the Information Security Practice and Experience, 2008

Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Bogus Data Filtering in Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007

Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes.
Proceedings of the Public Key Infrastructure, 2007

Efficient Certificateless Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007


  Loading...