Kwangsu Lee
Kwangsu Lee
Associate Professor, Sejong University
Verified email at - Homepage
Cited by
Cited by
New DSA-verifiable signcryption schemes
JB Shin, K Lee, K Shim
Information Security and Cryptology—ICISC 2002, 35-47, 2003
New constructions of revocable identity-based encryption from multilinear maps
S Park, K Lee, DH Lee
IEEE Transactions on Information Forensics and Security 10 (8), 1564-1577, 2015
Efficient revocable identity-based encryption via subset difference methods
K Lee, DH Lee, JH Park
Designs, Codes and Cryptography 85 (1), 39-76, 2017
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
K Lee, SG Choi, DH Lee, JH Park, M Yung
Advances in Cryptology–ASIACRYPT 2013 8269, 235-254, 2013
Sequential aggregate signatures with short public keys: Design, analysis and implementation studies
K Lee, DH Lee, M Yung
Public-Key Cryptography–PKC 2013, 423-442, 2013
Revocable hierarchical identity-based encryption with shorter private keys and update keys
K Lee, S Park
Designs, Codes and Cryptography 86 (10), 2407-2440, 2018
Unbounded hierarchical identity-based encryption with efficient revocation
G Ryu, K Lee, S Park, DH Lee
WISA 2015, 122-133, 2015
Self-updatable encryption with short public parameters and its extensions
K Lee
Designs, Codes and Cryptography 79 (1), 121-161, 2016
Aggregating CL-signatures revisited: Extended functionality and better efficiency
K Lee, DH Lee, M Yung
Financial Cryptography and Data Security–FC 2013, 171-188, 2013
Visual honey encryption: Application to steganography
JW Yoon, H Kim, HJ Jo, H Lee, K Lee
ACM Workshop on Information Hiding and Multimedia Security, 65-74, 2015
Two-input functional encryption for inner products from bilinear maps
K Lee, DH Lee
IEICE Transactions on Fundamentals of Electronics, 915-928, 2018
Fully secure hidden vector encryption under standard assumptions
JH Park, K Lee, W Susilo, DH Lee
Information Sciences 232, 188-207, 2013
Improved hidden vector encryption with short ciphertexts and tokens
K Lee, DH Lee
Designs, Codes and Cryptography 58 (3), 297-319, 2011
Patient-controlled attribute-based encryption for secure electronic health records system
J Eom, DH Lee, K Lee
Journal of Medical Systems 40 (12), 253, 2016
Revocable hierarchical identity-based encryption with adaptive security
K Lee
Theoretical Computer Science 880, 37-68, 2021
Anonymous HIBE with short ciphertexts: Full security in prime order groups
K Lee, JH Park, DH Lee
Designs, Codes and Cryptography 74 (2), 395-425, 2015
Sequential aggregate signatures made shorter
K Lee, DH Lee, M Yung
Applied Cryptography and Network Security–ACNS 2013, 202-217, 2013
Public-key revocation and tracing schemes with subset difference methods revisited
K Lee, WK Koo, DH Lee, JH Park
European Symposium on Research in Computer Security–ESORICS 2014, 1-18, 2014
A generic construction for revocable identity-based encryption with subset difference methods
K Lee
IACR Cryptology ePrint Archive, 2019
On the analysis of the revocable-storage identity-based encryption scheme
K Lee
arXiv preprint arXiv:1904.01203, 2019
The system can't perform the operation now. Try again later.
Articles 1–20