Seung Geol Choi
Seung Geol Choi
Associate Professor, US Naval Academy
Verified email at usna.edu - Homepage
Title
Cited by
Cited by
Year
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
2422014
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
International Symposium on Privacy Enhancing Technologies Symposium, 202-218, 2008
1522008
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1282012
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
942013
On the security of the “free-XOR” technique
SG Choi, J Katz, R Kumaresan, HS Zhou
Theory of Cryptography Conference, 39-53, 2012
752012
Improved non-committing encryption with applications to adaptively secure protocols
SG Choi, D Dachman-Soled, T Malkin, H Wee
International Conference on the Theory and Application of Cryptology andá…, 2009
742009
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
642016
Simple, black-box constructions of adaptively secure protocols
SG Choi, D Dachman-Soled, T Malkin, H Wee
Theory of Cryptography Conference, 387-402, 2009
642009
Bitr: Built-in tamper resilience
SG Choi, A Kiayias, T Malkin
International Conference on the Theory and Application of Cryptology andá…, 2011
602011
Black-box construction of a non-malleable encryption scheme from any semantically secure one
SG Choi, D Dachman-Soled, T Malkin, H Wee
Theory of Cryptography Conference, 427-444, 2008
582008
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
K Lee, SG Choi, DH Lee, JH Park, M Yung
International Conference on the Theory and Application of Cryptology andá…, 2013
532013
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
472016
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
SG Choi, J Katz, H Wee, HS Zhou
International Workshop on Public Key Cryptography, 73-88, 2013
422013
Short traceable signatures based on bilinear pairings
SG Choi, K Park, M Yung
International Workshop on Security, 88-103, 2006
382006
Anonymity 2.0–X. 509 extensions supporting privacy-friendly authentication
V Benjumea, SG Choi, J Lopez, M Yung
International Conference on Cryptology and Network Security, 265-281, 2007
352007
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Annual Cryptology Conference, 513-530, 2014
332014
Fair traceable multi-group signatures
V Benjumea, SG Choi, J Lopez, M Yung
International Conference on Financial Cryptography and Data Security, 231-246, 2008
322008
Two-party computing with encrypted data
SG Choi, A Elbaz, A Juels, T Malkin, M Yung
International Conference on the Theory and Application of Cryptology andá…, 2007
312007
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
182017
Secure multi-party computation minimizing online rounds
SG Choi, A Elbaz, T Malkin, M Yung
International Conference on the Theory and Application of Cryptology andá…, 2009
142009
The system can't perform the operation now. Try again later.
Articles 1–20