Kwangsu Lee

Orcid: 0000-0003-1910-8890

According to our database1, Kwangsu Lee authored at least 55 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Adaptive Chosen-Ciphertext Security of Distributed Broadcast Encryption.
CoRR, June, 2025

Adaptively Secure Distributed Broadcast Encryption with Linear-Size Public Parameters.
CoRR, May, 2025

Dynamic Threshold Key Encapsulation With Transparent Setup.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation.
IACR Cryptol. ePrint Arch., 2024

2023
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup.
IACR Cryptol. ePrint Arch., 2023

Delegate and Verify the Update Keys of Revocable Identity-Based Encryption.
IEEE Access, 2023

2022
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks.
IACR Cryptol. ePrint Arch., 2022

Two-Round Multi-Signatures from Okamoto Signatures.
IACR Cryptol. ePrint Arch., 2022

A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption.
IEEE Access, 2022

Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries.
IEEE Access, 2022

2021
Revocable hierarchical identity-based encryption with adaptive security.
Theor. Comput. Sci., 2021

Improving the security of direct anonymous attestation under host corruptions.
Int. J. Inf. Sec., 2021

Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency.
IACR Cryptol. ePrint Arch., 2021

2020
Tight security for the generic construction of identity-based signature (in the multi-instance setting).
Theor. Comput. Sci., 2020

Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption".
IEEE Trans. Cloud Comput., 2020

Functional Encryption for Set Intersection in the Multi-Client Setting.
IACR Cryptol. ePrint Arch., 2020

2019
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2019

On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme.
CoRR, 2019

Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions.
IEEE Access, 2019

Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings.
IEEE Access, 2019

2018
Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme.
CoRR, 2018

Multi-Client Order-Revealing Encryption.
IEEE Access, 2018

2017
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness.
CoRR, 2017

Efficient Hidden Vector Encryptions and Its Applications.
CoRR, 2017

2016
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
J. Medical Syst., 2016

Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptol. ePrint Arch., 2016

Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys.
IACR Cryptol. ePrint Arch., 2016

Two-Input Functional Encryption for Inner Products from Bilinear Maps.
IACR Cryptol. ePrint Arch., 2016

Revocable Hierarchical Identity-Based Encryption from Multilinear Maps.
CoRR, 2016

Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

2015
New Constructions of Revocable Identity-Based Encryption From Multilinear Maps.
IEEE Trans. Inf. Forensics Secur., 2015

Sequential aggregate signatures with short public keys without random oracles.
Theor. Comput. Sci., 2015

New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015

CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
IACR Cryptol. ePrint Arch., 2015

Anonymous HIBE with short ciphertexts: full security in prime order groups.
Des. Codes Cryptogr., 2015

Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Visual Honey Encryption: Application to Steganography.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
Security analysis of an identity-based strongly unforgeable signature scheme.
Inf. Sci., 2014

Efficient Revocable Identity-Based Encryption via Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2014

Self-Updatable Encryption with Short Public Parameters and Its Extensions.
IACR Cryptol. ePrint Arch., 2014

Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme.
CoRR, 2014

Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Fully secure hidden vector encryption under standard assumptions.
Inf. Sci., 2013

Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency.
IACR Cryptol. ePrint Arch., 2013

Public-Key Revocation and Tracing Schemes with Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2013

Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.
Proceedings of the Financial Cryptography and Data Security, 2013

Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Sequential Aggregate Signatures Made Shorter.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Privacy Preserving Revocable Predicate Encryption Revisited.
IACR Cryptol. ePrint Arch., 2012

2011
Improved hidden vector encryption with short ciphertexts and tokens.
Des. Codes Cryptogr., 2011

2010
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups.
KSII Trans. Internet Inf. Syst., 2010

2008
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions.
Proceedings of the Information Security and Cryptology, 2008

2002
New DSA-Verifiable Signcryption Schemes.
Proceedings of the Information Security and Cryptology, 2002


  Loading...