Publications

  • The corresponding author is marked with *.

Manuscript

[M4] Bora Jeong, Sunpill Kim, Seunghun Paik, and Jae Hong Seo*

Attack on Secure Triplet Loss

Under Review

[M3] Seunghun Paik, Sunpill Kim, and Jae Hong Seo*

Analysis on Locality Sensitive Hashing-based Biometric Template Protection Schemes

Under Review

[M2] Sunpill Kim, Hoyong Shin, and Jae Hong Seo*
Deep Face Template Protection in the Wild

Under Review

[M1] Hyung Tae Lee and Jae Hong Seo*

One the Security of Functional Encryption in the Generic Group Model

Under Review

Proceeding

[P2] Jae Hong Seo

Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11975, Springer 2020,

[P1] Keita Emura, Jae Hong Seo, and Yohei Watanabe

Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018. ACM 2018

Journal

[J24] Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, and Jae Hong Seo*; [alphabetical order]

Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger.

IEEE Access, Vol.10 , April 2022 (link)

[J22] Chanyang Ju , Hyeonbum Lee , Heewon Chung , Jae Hong Seo, and Sungwook Kim,

Efficient Sum-Check Protocol for Convolution

IEEE Access, Vol. 9, Dec 2021 (link)

[J21] Keita Emura, Jae Hong Seo, and Yohei Watanabe; [alphabetical order]

Efficient Revocable Identity-based Encryption with Short Public Parameters

Theoretical Computer Science, Vol. 863, pp 127-155, April 2021 (link)

[J20] Hyung Tae Lee, San Ling, Jae Hong Seo*, Huaxiong Wang, and Taek-Young Youn; [alphabetical order]

Public key encryption with equality test in the standard model.

Information Sciences, Vol. 516, pp 89--108, March 2020.

[J19] Jae Hong Seo*

Efficient Digital Signatures from RSA without Random Oracles

Information Sciences, Vol. 512, pp 471--480, March 2020 . DOI

[J18] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]

Public Key Encryption with Equality Test from Generic Assumptions in the Random Oracle Model

Information Sciences, Vol.500, pp 15--33, 2019. DOI

[J17] Sungwook Kim, Jinsu Kim, and Jae Hong Seo*

A New Approach for Practical Function-Private Inner Product Encryption.

Theoretical Computer Science, Vol. 783, pp 22--40, September 2019. DOI

[J16] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.

International Journal of Information Security, Vol.17(2), pp193--220, 2018

[J15] Jinsu Kim, Sungwook Kim, and Jae Hong Seo*; [alphabetical order]

A new Scale-Invariant Homomorphic Encryption Scheme.

Information Sciences, Vol.422, pp 177--187, 2018

[J14] Jae Hong Seo*

Short Signatures from Diffie–Hellman: Realizing Almost Compact Public Key

Journal of Cryptology, Volume 30, Issue 3, pp 735--759, July 2017. DOI

[J13] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]

Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test

Information Sciences, Vol.373, pp 419--440, 2016.

[J12] Hyung Tae Lee, San Ling, Jae Hong Seo* and Huaxiong Wang; [alphabetical order]

CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test

The Computer Journal, 59(11), pp 1689--1694, 2016.

[J11] Jae Hong Seo and Keita Emura,

Revocable hierarchical identity-based encryption via history-free approach

Theoretical Computer Science, Vol.615, pp45--60, 2016. DOI

[J10] Keita Emura, Jae Hong Seo*, and Taek-Young Youn; [alphabetical order]

Semi-generic Transformation of Revocable Hierarchical Identity-Based Encryption and its DBDH Instantiation

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.1,
pp83--91, Jan. 2016.

[J9] Jae Hong Seo and Keita Emura

Revocable Identity-Based Encryption with Rejoin Functionality

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E97-A, No.8,
pp1806--1809, Aug. 2014.

[J8] Jae Hong Seo and Keita Emura

Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

IEEE Transactions on Information Forensics and Security, Vol.9(7), pp1193--1205, 2014. DOI

[J7] Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption

Theoretical Computer Science,Vol.542, pp44--62, 2014. DOI

[J6] Jae Hong Seo and Keita Emura

A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp2282--2285, Nov. 2013.

[J5] Jae Hong Seo and Keita Emura

On Discrete Logarithm based Additively Homomorphic Encryption

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp. 2286--2289, Nov. 2013.

[J4] Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo*; [alphabetical order]

Multi-Party Privacy-Preserving Set Intersection with Quasi-linear Complexity

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.8, pp.1366--1378, Aug. 2012.

[J3] Jae Hong Seo

Short Round Sub-linear Zero-Knowledge Argument for Linear Algebraic Relations

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.4, pp.776--789, Apr. 2012.

[J2] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.45--56, Jan. 2011.

[J1] Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, and Dowon Hong

Analysis of Privacy-Preserving Element Reduction of a Multiset

Journal of the Korean Mathematical Society, Vol.46, No.1, pp.59--69, 2009.


Conference

[C17] Sungwook Kim, Hyeonbum Lee, and Jae Hong Seo*; [alphabetical order]
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
IACR-ASIACRYPT 2022 (link) (acceptance rate = 27%)

[C16] Chanyang Ju, Wenyi Tang, Changhao Chenli, Gwangwoon Lee, Jae Hong Seo, and Taeho Jung

Monitoring Provenance of Delegated Personal Data With Blockchain

IEEE Blockchain 2022 (link) (acceptance rate = 15.8%)

[C15] Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and Jae Hong Seo*,

IronMask: Modular Architecture for Protecting Deep Face Template

CVPR 2021 (link)

[C14] Yohei Watanabe, Keita Emura, and Jae Hong Seo

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters

CT-RSA 2017 (DOI)

[C13] Jae Hong Seo and Keita Emura

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption

IWSEC 2015 (DOI).

[C12] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

ACNS 2015 (DOI).

[C11] Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts CT-RSA 2015 (DOI) (acceptance rate = 23.4%).

[C10] Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo; [alphabetical order]

A New Additive Homomorphic Encryption based on the co-ACD Problem

ACM-CCS 2014 (DOI) (acceptance rate = 19.5%).

[C9] Hyung Tae Lee and Jae Hong Seo*; [alphabetical order]

Security Analysis of Multilinear Maps over the Integers

IACR-CRYPTO 2014 (DOI) (acceptance rate = 26%).

[C8] Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo*, and Christoph Striecks; [alphabetical order]

Practical Signatures from Standard Assumptions

IACR-EUROCRYPT 2013 (link) (acceptance rate = 20%).

[C7] Jae Hong Seo and Keita Emura

Revocable Identity-Based Encryption, Revisited: Security Definition and Construction

IACR-PKC 2013 (link) (acceptance rate = 28%).

[C6] Jae Hong Seo and Keita Emura

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption

CT-RSA 2013 (link) (acceptance rate = 28%).

[C5] Jae Hong Seo

On the (Im)possibility of Projecting Property in Prime-Order Setting

IACR-ASIACRYPT 2012 (link) (acceptance rate = 17%).

[C4] Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz

Constant-Round Multi-Party Private Set Union using Reversed Laurent Series

IACR-PKC 2012 (DOI) (acceptance rate = 22%).

[C3] Jae Hong Seo and Jung Hee Cheon

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

IACR-TCC 2012 (link) (acceptance rate = 27%).

[C2] Jae Hong Seo

Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra

IACR-PKC 2011 (acceptance rate = 27%).

[C1] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

IACR-PKC 2009 (acceptance rate = 25%).

Others

[E6] Sungwook Kim, Hyeonbum Lee, and Jae Hong Seo*; [alphabetical order]
Efficient Zero-Knowledge Argument in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
ePrint Archive (https://eprint.iacr.org/2021/1450)

[E5] Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, and Jae Hong Seo*;
[alphabetical order]

Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger

ePrint Archive (https://eprint.iacr.org/2020/735)

[E4] Jinsu Kim, Sungwook Kim, and Jae Hong Seo*; [alphabetical order]

Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency

ePint Archive (http://eprint.iacr.org/2015/992).

[E3] Jae Hong Seo

Short signatures from Diffie-Hellman, Revisited: Sublinear public key, CMA security, and tighter reduction

ePrint Archive (http://eprint.iacr.org/2014/138).

[E2] Jae Hong Seo

Short signatures from Diffie-Hellman: Realizing short public key

ePrint Archive (http://eprint.iacr.org/2012/480), (Eurocrypt 2013, merged with another paper)

[E1] Jae Hong Seo and Jung Hee Cheon

Fully secure anonymous hierarchical identity-based encryption with constant size ciphertexts

ePrint Archive (http://eprint.iacr.org/2011/021).