Jae Hong Seo
Orcid: 0000-0003-0547-5702
According to our database1,
Jae Hong Seo
authored at least 58 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2024
Cougar: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption.
IACR Cryptol. ePrint Arch., 2024
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
Des. Codes Cryptogr., September, 2023
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption.
IEEE Trans. Inf. Forensics Secur., 2023
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup.
IACR Cryptol. ePrint Arch., 2023
TENET: Sublogarithmic Proof and Sublinear Verifier Inner Product Argument without a Trusted Setup.
Proceedings of the Advances in Information and Computer Security, 2023
Security Analysis on Locality-Sensitive Hashing-based Biometric Template Protection Schemes.
Proceedings of the 34th British Machine Vision Conference 2023, 2023
2022
IEEE Access, 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Theor. Comput. Sci., 2021
Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020
2019
Theor. Comput. Sci., 2019
Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019
2018
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018
2017
J. Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Theor. Comput. Sci., 2016
Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016
CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Information and Computer Security, 2015
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Proceedings of the Topics in Cryptology, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
2009
Proceedings of the Public Key Cryptography, 2009
2006
IACR Cryptol. ePrint Arch., 2006