Publications

Proceeding

[p1] Keita Emura, Jae Hong Seo, and Yohei Watanabe\

Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018. ACM 2018

Journal

[J16] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.

International Journal of Information Science, Vol.17(2), pp193--220, 2018

[J15] Jinsu Kim, Sungwook Kim, and Jae Hong Seo (corresponding author)

A new scale-invariant homomorphic encryption scheme.

Information Sciences, Vol.422, pp 177--187, 2018

[J14] Jae Hong Seo

Short Signatures from Diffie–Hellman: Realizing Almost Compact Public Key

Journal of Cryptology, Volume 30, Issue 3, pp 735--759, July 2017. DOI

[J13] Hyung Tae Lee, San Ling, Jae Hong Seo (corresponding author), and Huaxiong Wang; [alphabetical order]

Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test

Information Sciences, Vol.373, pp 419--440, 2016.

[J12] Hyung Tae Lee, San Ling, Jae Hong Seo (corresponding author) and Huaxiong Wang

CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test

The Computer Journal, 59(11), pp 1689--1694, 2016.

[J11] Jae Hong Seo and Keita Emura,

Revocable hierarchical identity-based encryption via history-free approach

Theoretical Computer Science, Vol.615, pp45--60, 2016. DOI

[J10] Keita Emura, Jae Hong Seo (corresponding author), and Taek-Young Youn; [alphabetical order]

Semi-generic Transformation of Revocable Hierarchical Identity-Based Encryption and its DBDH Instantiation

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.1, pp83--91, Jan. 2016.

[J9] Jae Hong Seo and Keita Emura

Revocable Identity-Based Encryption with Rejoin Functionality

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E97-A, No.8, pp1806--1809, Aug. 2014.

[J8] Jae Hong Seo and Keita Emura

Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

IEEE Transactions on Information Forensics and Security, Vol.9(7), pp1193--1205, 2014. DOI

[J7] Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption

Theoretical Computer Science,Vol.542, pp44--62, 2014. DOI

[J6] Jae Hong Seo and Keita Emura

A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp2282--2285, Nov. 2013.

[J5] Jae Hong Seo and Keita Emura

On Discrete Logarithm based Additively Homomorphic Encryption

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp. 2286--2289, Nov. 2013.

[J4] Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo (corresponding author); [alphabetical order]

Multi-Party Privacy-Preserving Set Intersection with Quasi-linear Complexity

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.8, pp.1366--1378, Aug. 2012.

[J3] Jae Hong Seo

Short Round Sub-linear Zero-Knowledge Argument for Linear Algebraic Relations

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.4, pp.776--789, Apr. 2012.

[J2] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.45--56, Jan. 2011.

[J1] Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, and Dowon Hong

Analysis of Privacy-Preserving Element Reduction of a Multiset

Journal of the Korean Mathematical Society, Vol.46, No.1, pp.59--69, 2009.

Conference

[C14] Yohei Watanabe, Keita Emura, and Jae Hong Seo

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters

CT-RSA 2017, (DOI)

[C13] Jae Hong Seo and Keita Emura

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

IWSEC 2015, (DOI).

[C12] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

ACNS 2015, (DOI).

[C11] Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts CT-RSA 2015 (DOI) (acceptance rate = 23.4%).

[C10] Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo; [alphabetical order]

A New Additive Homomorphic Encryption based on the co-ACD Problem

ACM-CCS 2014 (DOI) (acceptance rate = 19.5%).

[C9] Hyung Tae Lee and Jae Hong Seo (corresponding author); [alphabetical order]

Security Analysis of Multilinear Maps over the Integers

IACR-CRYPTO 2014 (DOI) (acceptance rate = 26%).

[C8] Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks; [alphabetical order]

Practical Signatures from Standard Assumptions

IACR-EUROCRYPT 2013 (link) (acceptance rate = 20%).

[C7] Jae Hong Seo and Keita Emura

Revocable Identity-Based Encryption, Revisited: Security Definition and Construction

IACR-PKC 2013 (link) (acceptance rate = 28%).

[C6] Jae Hong Seo and Keita Emura

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption

CT-RSA 2013 (link) (acceptance rate = 28%).

[C5] Jae Hong Seo

On the (Im)possibility of Projecting Property in Prime-Order Setting

IACR-ASIACRYPT 2012 (link) (acceptance rate = 17%).

[C4] Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz

Constant-Round Multi-Party Private Set Union using Reversed Laurent Series

IACR-PKC 2012 (DOI) (acceptance rate = 22%).

[C3] Jae Hong Seo and Jung Hee Cheon

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

IACR-TCC 2012 (link) (acceptance rate = 27%).

[C2] Jae Hong Seo

Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra

IACR-PKC 2011 (acceptance rate = 27%).

[C1] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

IACR-PKC 2009 (acceptance rate = 25%).

Other

[E4] Jinsu Kim, Sungwook Kim, and Jae Hong Seo (corresponding author); [alphabetical order]

Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency

ePint Archive (http://eprint.iacr.org/2015/992).

[E3] Jae Hong Seo

Short signatures from Diffie-Hellman, Revisited: Sublinear public key, CMA security, and tighter reduction

ePrint Archive (http://eprint.iacr.org/2014/138).

[E2] Jae Hong Seo

Short signatures from Diffie-Hellman: Realizing short public key

ePrint Archive (http://eprint.iacr.org/2012/480), (Eurocrypt 2013, merged with another paper)

[E1] Jae Hong Seo and Jung Hee Cheon

Fully secure anonymous hierarchical identity-based encryption with constant size ciphertexts

ePrint Archive (http://eprint.iacr.org/2011/021).