default search action
Kwangsu Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i40]Kwangsu Lee:
Anonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation. IACR Cryptol. ePrint Arch. 2024: 501 (2024) - [i39]Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim:
Dynamic Threshold Key Encapsulation with a Transparent Setup. IACR Cryptol. ePrint Arch. 2024: 1311 (2024) - 2023
- [j30]Kwangsu Lee
:
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption. IEEE Access 11: 52636-52652 (2023) - [j29]Kwangsu Lee
:
Decentralized multi-client functional encryption for set intersection with improved efficiency. Des. Codes Cryptogr. 91(3): 1053-1093 (2023) - [i38]Kwangsu Lee:
Decentralized Threshold Signatures for Blockchains with Non-Interactive and Transparent Setup. IACR Cryptol. ePrint Arch. 2023: 1206 (2023) - 2022
- [j28]Kwangsu Lee
, Joon Sik Kim:
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption. IEEE Access 10: 44178-44199 (2022) - [j27]Kwangsu Lee
:
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries. IEEE Access 10: 62670-62692 (2022) - [j26]Kwangsu Lee
, Minhye Seo:
Functional encryption for set intersection in the multi-client setting. Des. Codes Cryptogr. 90(1): 17-47 (2022) - [i37]Kwangsu Lee, Hyoseung Kim:
Two-Round Multi-Signatures from Okamoto Signatures. IACR Cryptol. ePrint Arch. 2022: 1117 (2022) - [i36]Joo Woo, Kwangsu Lee, Jong Hwan Park:
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks. IACR Cryptol. ePrint Arch. 2022: 1665 (2022) - 2021
- [j25]Hyoseung Kim, Kwangsu Lee
, Jong Hwan Park
, Dong Hoon Lee:
Improving the security of direct anonymous attestation under host corruptions. Int. J. Inf. Sec. 20(4): 475-492 (2021) - [j24]Kwangsu Lee
:
Revocable hierarchical identity-based encryption with adaptive security. Theor. Comput. Sci. 880: 37-68 (2021) - [i35]Kwangsu Lee, Joon Sik Kim:
A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2021: 502 (2021) - [i34]Kwangsu Lee:
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency. IACR Cryptol. ePrint Arch. 2021: 524 (2021) - 2020
- [j23]Kwangsu Lee
:
Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption". IEEE Trans. Cloud Comput. 8(4): 1299-1300 (2020) - [j22]Youngkyung Lee
, Jong Hwan Park, Kwangsu Lee
, Dong Hoon Lee:
Tight security for the generic construction of identity-based signature (in the multi-instance setting). Theor. Comput. Sci. 847: 122-133 (2020) - [i33]Kwangsu Lee:
Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries. IACR Cryptol. ePrint Arch. 2020: 822 (2020) - [i32]Kwangsu Lee, Minhye Seo:
Functional Encryption for Set Intersection in the Multi-Client Setting. IACR Cryptol. ePrint Arch. 2020: 1154 (2020) - [i31]Kwangsu Lee:
Delegate and Verify the Update Keys of Revocable Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2020: 1475 (2020)
2010 – 2019
- 2019
- [j21]Kwangsu Lee
, Jong Hwan Park:
Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions. IEEE Access 7: 60333-60347 (2019) - [j20]Kwangsu Lee
:
Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings. IEEE Access 7: 165122-165126 (2019) - [j19]Kwangsu Lee
, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. Comput. J. 62(4): 545-562 (2019) - [e1]Kwangsu Lee:
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11396, Springer 2019, ISBN 978-3-030-12145-7 [contents] - [i30]Kwangsu Lee:
On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme. CoRR abs/1904.01203 (2019) - [i29]Kwangsu Lee:
A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods. IACR Cryptol. ePrint Arch. 2019: 798 (2019) - 2018
- [j18]Jieun Eom, Dong Hoon Lee
, Kwangsu Lee
:
Multi-Client Order-Revealing Encryption. IEEE Access 6: 45458-45472 (2018) - [j17]Kwangsu Lee
, Seunghwan Park:
Revocable hierarchical identity-based encryption with shorter private keys and update keys. Des. Codes Cryptogr. 86(10): 2407-2440 (2018) - [j16]Kwangsu Lee
, Dong Hoon Lee:
Two-Input Functional Encryption for Inner Products from Bilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(6): 915-928 (2018) - [i28]Jieun Eom, Dong Hoon Lee, Kwangsu Lee:
Multi-Client Order-Revealing Encryption. CoRR abs/1809.01320 (2018) - [i27]Kwangsu Lee:
Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme. CoRR abs/1809.06015 (2018) - 2017
- [j15]Kwangsu Lee
, Dong Hoon Lee, Jong Hwan Park:
Efficient revocable identity-based encryption via subset difference methods. Des. Codes Cryptogr. 85(1): 39-76 (2017) - [j14]Kwangsu Lee
, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. Theor. Comput. Sci. 667: 51-92 (2017) - [i26]Kwangsu Lee:
Efficient Hidden Vector Encryptions and Its Applications. CoRR abs/1702.07456 (2017) - [i25]Kwangsu Lee:
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness. CoRR abs/1703.08306 (2017) - [i24]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. IACR Cryptol. ePrint Arch. 2017: 73 (2017) - 2016
- [j13]Kwangsu Lee
:
Self-updatable encryption with short public parameters and its extensions. Des. Codes Cryptogr. 79(1): 121-161 (2016) - [j12]Jieun Eom, Dong Hoon Lee, Kwangsu Lee
:
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System. J. Medical Syst. 40(12): 253:1-253:16 (2016) - [c10]Kwangsu Lee
:
Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. ICISC 2016: 101-125 - [i23]Seunghwan Park, Dong Hoon Lee, Kwangsu Lee:
Revocable Hierarchical Identity-Based Encryption from Multilinear Maps. CoRR abs/1610.07948 (2016) - [i22]Kwangsu Lee:
Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups. CoRR abs/1611.02821 (2016) - [i21]Kwangsu Lee, Dong Hoon Lee:
Two-Input Functional Encryption for Inner Products from Bilinear Maps. IACR Cryptol. ePrint Arch. 2016: 432 (2016) - [i20]Kwangsu Lee, Seunghwan Park:
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. IACR Cryptol. ePrint Arch. 2016: 460 (2016) - [i19]Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR Cryptol. ePrint Arch. 2016: 500 (2016) - [i18]Kwangsu Lee:
Revocable Hierarchical Identity-Based Encryption with Adaptive Security. IACR Cryptol. ePrint Arch. 2016: 749 (2016) - 2015
- [j11]Kwangsu Lee
, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with short ciphertexts: full security in prime order groups. Des. Codes Cryptogr. 74(2): 395-425 (2015) - [j10]Kwangsu Lee
, Dong Hoon Lee:
Adaptively secure broadcast encryption under standard assumptions with better efficiency. IET Inf. Secur. 9(3): 149-157 (2015) - [j9]Jong Hwan Park, Kwangsu Lee
, Dong Hoon Lee:
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem. Inf. Sci. 325: 256-270 (2015) - [j8]Kwangsu Lee
, Intae Kim
, Seong Oun Hwang:
Privacy preserving revocable predicate encryption revisited. Secur. Commun. Networks 8(3): 471-485 (2015) - [j7]Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Sequential aggregate signatures with short public keys without random oracles. Theor. Comput. Sci. 579: 100-125 (2015) - [j6]Seunghwan Park, Kwangsu Lee
, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption From Multilinear Maps. IEEE Trans. Inf. Forensics Secur. 10(8): 1564-1577 (2015) - [c9]Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee
:
Visual Honey Encryption: Application to Steganography. IH&MMSec 2015: 65-74 - [c8]Geumsook Ryu, Kwangsu Lee
, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. WISA 2015: 122-133 - [i17]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys without Random Oracles. CoRR abs/1502.06691 (2015) - [i16]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups. CoRR abs/1502.07812 (2015) - [i15]Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. IACR Cryptol. ePrint Arch. 2015: 827 (2015) - [i14]Kwangsu Lee, Jong Hwan Park:
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions. IACR Cryptol. ePrint Arch. 2015: 921 (2015) - [i13]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. IACR Cryptol. ePrint Arch. 2015: 1202 (2015) - 2014
- [j5]Kwangsu Lee
, Dong Hoon Lee:
Security analysis of an identity-based strongly unforgeable signature scheme. Inf. Sci. 286: 29-34 (2014) - [c7]Kwangsu Lee
, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. ESORICS (2) 2014: 1-18 - [i12]Kwangsu Lee, Dong Hoon Lee:
Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme. CoRR abs/1411.4696 (2014) - [i11]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient Revocable Identity-Based Encryption via Subset Difference Methods. IACR Cryptol. ePrint Arch. 2014: 132 (2014) - [i10]Kwangsu Lee:
Self-Updatable Encryption with Short Public Parameters and Its Extensions. IACR Cryptol. ePrint Arch. 2014: 231 (2014) - [i9]Kwangsu Lee, Dong Hoon Lee:
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme. IACR Cryptol. ePrint Arch. 2014: 246 (2014) - 2013
- [j4]Jong Hwan Park, Kwangsu Lee
, Willy Susilo
, Dong Hoon Lee:
Fully secure hidden vector encryption under standard assumptions. Inf. Sci. 232: 188-207 (2013) - [c6]Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. ACNS 2013: 202-217 - [c5]Kwangsu Lee
, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. ASIACRYPT (1) 2013: 235-254 - [c4]Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. Financial Cryptography 2013: 171-188 - [c3]Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. Public Key Cryptography 2013: 423-442 - [i8]Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods. IACR Cryptol. ePrint Arch. 2013: 228 (2013) - [i7]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures Made Shorter. IACR Cryptol. ePrint Arch. 2013: 384 (2013) - [i6]Kwangsu Lee, Dong Hoon Lee:
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency. IACR Cryptol. ePrint Arch. 2013: 488 (2013) - [i5]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. IACR Cryptol. ePrint Arch. 2013: 762 (2013) - [i4]Seunghwan Park, Kwangsu Lee, Dong Hoon Lee:
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 880 (2013) - 2012
- [j3]Kwangsu Lee
, Jong Hwan Park, Dong Hoon Lee:
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1631-1636 (2012) - [i3]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies. IACR Cryptol. ePrint Arch. 2012: 518 (2012) - [i2]Kwangsu Lee, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. IACR Cryptol. ePrint Arch. 2012: 562 (2012) - [i1]Kwangsu Lee, Intae Kim, Seong Oun Hwang:
Privacy Preserving Revocable Predicate Encryption Revisited. IACR Cryptol. ePrint Arch. 2012: 655 (2012) - 2011
- [j2]Kwangsu Lee
, Dong Hoon Lee:
Improved hidden vector encryption with short ciphertexts and tokens. Des. Codes Cryptogr. 58(3): 297-319 (2011) - 2010
- [j1]Kwangsu Lee
, Dong Hoon Lee:
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups. KSII Trans. Internet Inf. Syst. 4(5): 968-988 (2010)
2000 – 2009
- 2008
- [c2]Kwangsu Lee
, Jung Yeon Hwang, Dong Hoon Lee:
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ICISC 2008: 166-183 - 2002
- [c1]Jun-Bum Shin, Kwangsu Lee
, Kyungah Shim:
New DSA-Verifiable Signcryption Schemes. ICISC 2002: 35-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint