Follow
Hyung Tae Lee
Hyung Tae Lee
Verified email at cau.ac.kr - Homepage
Title
Cited by
Cited by
Year
Semi-generic construction of public key encryption and identity-based encryption with equality test
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 373, 419-440, 2016
672016
Provably Secure Group Signature Schemes from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
IEEE Transactions on Information Theory, 2020
612020
A Provably Secure Group Signature Scheme from Code-Based Assumptions
MF Ezerman, HT Lee, S Ling, K Nguyen, H Wang
Advances in Cryptology–ASIACRYPT 2015, 260-285, 2015
61*2015
Public key encryption with equality test in the standard model
HT Lee, S Ling, JH Seo, H Wang, TY Youn
Information Sciences 516, 89-108, 2020
522020
Method and system for ID-based encryption and decryption
HJ Yoon, JH Sohn, SY Lee, HT Lee, JH Cheon
US Patent 9,379,891, 2016
512016
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
412019
Security analysis of multilinear maps over the integers
HT Lee, JH Seo
Advances in Cryptology–CRYPTO 2014, 224-240, 2014
352014
On the efficiency of FHE-based private queries
M Kim, HT Lee, S Ling, H Wang
IEEE Transactions on Dependable and Secure Computing, 2016
302016
Mutual private set intersection with linear complexity
M Kim, HT Lee, JH Cheon
International Workshop on Information Security Applications, 219-231, 2011
292011
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
BHM Tan, HT Lee, H Wang, SQ Ren, AMM Khin
IEEE Transactions on Dependable and Secure Computing, 2020
222020
Better Security for Queries on Encrypted Databases.
M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang
IACR Cryptology ePrint Archive 2016, 470, 2016
212016
CCA2 Attack and Modification of Huang et al.’s Public Key Encryption with Authorized Equality Test
HT Lee, S Ling, JH Seo, H Wang
The Computer Journal 59 (11), 1689-1694, 2016
202016
Private Compound Wildcard Queries using Fully Homomorphic Encryption
M Kim, HT Lee, S Ling, BHM Tan, H Wang
IEEE Transactions on Dependable and Secure Computing, 2017
192017
Accelerating ID-based Encryption based on Trapdoor DL using Pre-computation
HT Lee, JH Cheon, J Hong
Cryptology ePrint Archive, Report 2011/187, 2011
152011
Security analysis and modification of ID-based encryption with equality test from ACISP 2017
HT Lee, H Wang, K Zhang
Australasian Conference on Information Security and Privacy, 780-786, 2018
142018
A New Additive Homomorphic Encryption based on the co-ACD Problem
JH Cheon, HT Lee, JH Seo
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
142014
Public key encryption with equality test from generic assumptions in the random oracle model
HT Lee, S Ling, JH Seo, H Wang
Information Sciences 500, 15-33, 2019
132019
Correcting errors in private keys obtained from cold boot attacks
HT Lee, HT Kim, YJ Baek, JH Cheon
Information Security and Cryptology-ICISC 2011, 74-87, 2011
122011
Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem
KMM Aung, HT Lee, BHM Tan, H Wang
Theoretical Computer Science 771, 49-70, 2019
82019
IronMask: Modular architecture for protecting deep face template
S Kim, Y Jeong, J Kim, J Kim, HT Lee, JH Seo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20