Follow
Jong Hwan Park
Jong Hwan Park
Sangmyung University, Department of Computer Science, Assistant professor
Verified email at smu.ac.kr
Title
Cited by
Cited by
Year
Trapdoor security in a searchable public-key encryption scheme with a designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Journal of Systems and Software 83 (5), 763-771, 2010
2902010
Improved searchable public key encryption with designated tester
HS Rhee, JH Park, W Susilo, DH Lee
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1712009
Efficient certificateless signature schemes
KY Choi, JH Park, JY Hwang, DH Lee
International Conference on Applied Cryptography and Network Security, 443-458, 2007
1602007
A new provably secure certificateless short signature scheme
KY Choi, JH Park, DH Lee
Computers & Mathematics with Applications 61 (7), 1760-1768, 2011
1042011
Efficient revocable identity-based encryption via subset difference methods
K Lee, DH Lee, JH Park
Designs, Codes and Cryptography 85 (1), 39-76, 2017
692017
Generic construction of designated tester public-key encryption with keyword search
HS Rhee, JH Park, DH Lee
Information Sciences 205, 93-109, 2012
642012
Public key broadcast encryption schemes with shorter transmissions
JH Park, HJ Kim, MH Sung, DH Lee
IEEE Transactions on Broadcasting 54 (3), 401-411, 2008
642008
Inner-product encryption under standard assumptions
JH Park
Designs, Codes and Cryptography 58 (3), 235-257, 2011
632011
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
K Lee, SG Choi, DH Lee, JH Park, M Yung
International Conference on the Theory and Application of Cryptology and …, 2013
592013
Efficient hidden vector encryption for conjunctive queries on encrypted data
JH Park
IEEE Transactions on Knowledge and Data Engineering 23 (10), 1483-1497, 2010
442010
Certificateless public key encryption in the selective-ID security model (without random oracles)
JH Park, KY Choi, JY Hwang, DH Lee
International Conference on Pairing-Based Cryptography, 60-82, 2007
292007
An efficient predicate encryption with constant pairing computations and minimum costs
I Kim, SO Hwang, JH Park, C Park
IEEE Transactions on Computers 65 (10), 2947-2958, 2016
232016
Fully secure hidden vector encryption under standard assumptions
JH Park, K Lee, W Susilo, DH Lee
Information Sciences 232, 188-207, 2013
222013
Anonymous HIBE: Compact construction over prime-order groups
JH Park, DH Lee
IEEE Transactions on Information Theory 59 (4), 2531-2541, 2013
222013
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06
JH Park, KT Kim, DH Lee
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
192008
Anonymous HIBE with short ciphertexts: full security in prime order groups
K Lee, JH Park, DH Lee
Designs, Codes and Cryptography 74 (2), 395-425, 2015
182015
Emblem and r
M Seo, JH Park, DH Lee, S Kim, SJ Lee
EMBLEM. Technical Report. National Institute of Standards and Technology, 2017
162017
Public-key revocation and tracing schemes with subset difference methods revisited
K Lee, WK Koo, DH Lee, JH Park
European Symposium on Research in Computer Security, 1-18, 2014
162014
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
JH Park, DH Lee
Designs, Codes and Cryptography 60 (3), 255-276, 2011
152011
An efficient IBE scheme with tight security reduction in the random oracle model
JH Park, DH Lee
Designs, Codes and Cryptography 79 (1), 63-85, 2016
132016
The system can't perform the operation now. Try again later.
Articles 1–20