Jihye Kim

Orcid: 0000-0003-2953-7883

Affiliations:
  • Kookmin University, Seoul, South Korea
  • University of California, Irvine, CA, USA (PhD 2008)


According to our database1, Jihye Kim authored at least 56 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs.
IEEE Trans. Dependable Secur. Comput., 2024

zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system.
IACR Cryptol. ePrint Arch., 2024

sfLiLAC: Linear Prover, Logarithmic Verifier and Field-agnostic Multilinear Polynomial Commitment Scheme.
IACR Cryptol. ePrint Arch., 2024

Hadamard Product Arguments and Their Applications.
IACR Cryptol. ePrint Arch., 2024

zkMarket : Privacy-preserving Digital Data Trade System via Blockchain.
IACR Cryptol. ePrint Arch., 2024

Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines.
IACR Cryptol. ePrint Arch., 2024

DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group.
IACR Cryptol. ePrint Arch., 2024

A Hardware-Based Correct Execution Environment Supporting Virtual Memory.
IEEE Access, 2024

GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2024

zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts.
IEEE Access, 2023

Efficient Transparent Polynomial Commitments for zk-SNARKs.
Proceedings of the Computer Security - ESORICS 2023, 2023

2021
Privacy-preserving Identity Management System.
IACR Cryptol. ePrint Arch., 2021

Succinct Zero-Knowledge Batch Proofs for Set Accumulators.
IACR Cryptol. ePrint Arch., 2021

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs.
IEEE Access, 2021

2020
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption.
Sensors, 2020

vCNN: Verifiable Convolutional Neural Network.
IACR Cryptol. ePrint Arch., 2020

Efficient Verifiable Image Redacting based on zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment.
IEEE Access, 2020

Simulation-Extractable zk-SNARK With a Single Verification.
IEEE Access, 2020

2019
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
ACM Trans. Embed. Comput. Syst., 2019

FAS: Forward secure sequential aggregate signatures for secure logging.
Inf. Sci., 2019

BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments.
IACR Cryptol. ePrint Arch., 2019

SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain.
IACR Cryptol. ePrint Arch., 2019

SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization.
IACR Cryptol. ePrint Arch., 2019

QAP-based Simulation-Extractable SNARK with a Single Verification.
IACR Cryptol. ePrint Arch., 2019

Scalable Wildcarded Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2019

Forward Secure Identity-Based Signature Scheme with RSA.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

AILocker: authenticated image locker for video.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper).
Proceedings of the 20th ACM SIGPLAN/SIGBED International Conference on Languages, 2019

2018
Forward-secure ID based digital signature scheme with forward-secure private key generator.
Inf. Sci., 2018

AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems.
IACR Cryptol. ePrint Arch., 2018

Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

2017
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast.
IACR Cryptol. ePrint Arch., 2017

Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

PASS: Privacy aware secure signature scheme for surveillance systems.
Proceedings of the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2017

2015
Mediated aggregate signature schemes in wireless sensor networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

2014
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory.
IEEE Trans. Computers, 2014

2012
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes.
IACR Cryptol. ePrint Arch., 2012

Privacy-preserving web search.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2011

Constant-Round Privacy Preserving Multiset Union.
IACR Cryptol. ePrint Arch., 2011

Threshold signature schemes for ElGamal variants.
Comput. Stand. Interfaces, 2011

2010
Fair threshold decryption with semi-trusted third parties.
Int. J. Appl. Cryptogr., 2010

Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization.
IEEE Secur. Priv., 2010

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
IACR Cryptol. ePrint Arch., 2010

2009
SRDP: Secure route discovery for dynamic source routing in MANETs.
Ad Hoc Networks, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

2008
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
IACR Cryptol. ePrint Arch., 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

2007
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
SRDP: Securing Route Discovery in DSR.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

2004
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004


  Loading...