Publications

    Journal


         
[J14] Jae Hong Seo
         
Short Signatures from Diffie–Hellman: Realizing Almost Compact Public Key
         Journal of Cryptology, Volume 30, Issue 3, pp 735–759, July 2017. DOI
[J13] Hyung Tae Lee, San Ling, Jae Hong Seo (corresponding author), and Huaxiong Wang; [alphabetical order]
         Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test
         Information Sciences, Vol.373, pp419--440, 2016.
[J12] Hyung Tae Lee, San Ling, Jae Hong Seo and Huaxiong Wang
         CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test
         The Computer Journal, 59(11), pp1689--1694, 2016.
[J11] Jae Hong Seo and Keita Emura, 
         Revocable hierarchical identity-based encryption via history-free approach
         
Theoretical Computer Science, Vol.615,  pp45--60, 2016. DOI
[J10] Keita Emura, Jae Hong Seo (corresponding author), and Taek-Young Youn; [alphabetical order]
          Semi-generic Transformation of Revocable Hierarchical Identity-Based Encryption and its DBDH Instantiation
          IEICE 
transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.1, pp83--91, Jan. 2016.
[J9]  Jae Hong Seo and Keita Emura
Revocable Identity-Based Encryption with Rejoin Functionality
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E97-A, No.8, pp1806--1809, Aug. 2014.
[J8]  Jae Hong Seo and Keita Emura
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
IEEE Transactions on Information Forensics and Security, Vol.9(7), pp1193--1205, 2014. DOI 
[J7]  Jae Hong Seo and Keita Emura
Revocable Hierarchical Identity-Based Encryption
Theoretical Computer Science,Vol.542, pp44--62, 2014. DOI
[J6]  Jae Hong Seo and Keita Emura
A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp2282--2285, Nov. 2013.
[J5]  Jae Hong Seo and Keita Emura
On Discrete Logarithm based Additively Homomorphic Encryption
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp. 2286--2289, Nov. 2013.
[J4]  Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo (corresponding author); [alphabetical order]
Multi-Party Privacy-Preserving Set Intersection with Quasi-linear Complexity
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.8, pp.1366--1378, Aug. 2012.
[J3]  Jae Hong Seo
Short Round Sub-linear Zero-Knowledge Argument for  Linear Algebraic Relations
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.4, pp.776--789, Apr. 2012.
[J2]  Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.45--56, Jan. 2011.
[J1]  Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, and Dowon Hong
Analysis of Privacy-Preserving Element Reduction of a Multiset
Journal of the Korean Mathematical Society, Vol.46, No.1, pp.59--69, 2009.
    
    Conference

          [C14] Yohei Watanabe, Keita Emura, and Jae Hong Seo
                    
New Revocable IBE in Prime-Order Groups: 
Adaptively Secure, Decryption Key Exposure 
Resistant, and with Short Public Parameters
          
                    CT-RSA 2017, (DOI)
          [C13] Jae Hong Seo and Keita Emura
                    
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption          
                    IWSEC 2015, (DOI).
          [C12] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama
                    
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
                    ACNS 2015, (DOI).
[C11] Jae Hong Seo and Keita Emura
         
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts 
          CT-RSA 2015 (
DOI(acceptance rate = 23.4%).
[C10] Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo; [alphabetical order]
A New Additive Homomorphic Encryption based on the co-ACD Problem
ACM-CCS 2014 (DOI) (acceptance rate = 19.5%). 
[C9]  Hyung Tae Lee and Jae Hong Seo (corresponding author); [alphabetical order]
Security Analysis of Multilinear Maps over the Integers
IACR-CRYPTO 2014 (DOI) (acceptance rate = 26%). 
[C8]  Florian BöhlDennis HofheinzTibor JagerJessica KochJae Hong Seo, and Christoph Striecks; [alphabetical order]
Practical Signatures from Standard Assumptions
IACR-EUROCRYPT 2013 (link) (acceptance rate = 20%).
[C7]  Jae Hong Seo and Keita Emura
Revocable Identity-Based Encryption, Revisited: Security Definition and Construction
IACR-PKC 2013 (link) (acceptance rate = 28%).
[C6]  Jae Hong Seo and Keita Emura
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
CT-RSA 2013 (link) (acceptance rate = 28%).
[C5]  Jae Hong Seo
On the (Im)possibility of Projecting Property in Prime-Order Setting
IACR-ASIACRYPT 2012  (link) (acceptance rate = 17%).
[C4]  Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz
Constant-Round Multi-Party Private Set Union using Reversed Laurent Series
IACR-PKC 2012 (DOI) (acceptance rate = 22%).
[C3]  Jae Hong Seo and Jung Hee Cheon
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
IACR-TCC 2012 (link) (acceptance rate = 27%). 
[C2]  Jae Hong Seo
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra
IACR-PKC 2011 (acceptance rate = 27%). 
[C1]  Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
IACR-PKC 2009 (acceptance rate = 25%). 


    Other
          [E4]  Jinsu Kim, Sungwook Kim, and Jae Hong Seo (corresponding author)[alphabetical order]
                    Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency
                    ePint Archive (
http://eprint.iacr.org/2015/992).
[E3]  Jae Hong Seo
Short signatures from Diffie-Hellman, Revisited: Sublinear public key, CMA security, and tighter reduction
[E2]  Jae Hong Seo
  1. Short signatures from Diffie-Hellman: Realizing short public key
  1. ePrint Archive (http://eprint.iacr.org/2012/480), (Eurocrypt 2013, merged with another paper)
[E1]  Jae Hong Seo and Jung Hee Cheon
Fully secure anonymous hierarchical identity-based encryption with constant size ciphertexts

 




SelectionFile type iconFile nameDescriptionSizeRevisionTimeUser
Comments