Kwangsu Lee
Orcid: 0000-0003-1910-8890
According to our database1,
Kwangsu Lee
authored at least 53 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Decentralized multi-client functional encryption for set intersection with improved efficiency.
Des. Codes Cryptogr., March, 2023
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup.
IACR Cryptol. ePrint Arch., 2023
IEEE Access, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
IEEE Access, 2022
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries.
IEEE Access, 2022
2021
Theor. Comput. Sci., 2021
Int. J. Inf. Sec., 2021
2020
Tight security for the generic construction of identity-based signature (in the multi-instance setting).
Theor. Comput. Sci., 2020
Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption".
IEEE Trans. Cloud Comput., 2020
2019
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts.
Comput. J., 2019
IEEE Access, 2019
Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings.
IEEE Access, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Revocable hierarchical identity-based encryption with shorter private keys and update keys.
Des. Codes Cryptogr., 2018
Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme.
CoRR, 2018
2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency.
Theor. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness.
CoRR, 2017
2016
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.
J. Medical Syst., 2016
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
Secur. Commun. Networks, 2015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem.
Inf. Sci., 2015
Adaptively secure broadcast encryption under standard assumptions with better efficiency.
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
2014
Inf. Sci., 2014
CoRR, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.
IACR Cryptol. ePrint Arch., 2012
2011
Des. Codes Cryptogr., 2011
2010
KSII Trans. Internet Inf. Syst., 2010
2008
Proceedings of the Information Security and Cryptology, 2008
2002
Proceedings of the Information Security and Cryptology, 2002