Publications
The corresponding author is marked with *.
Manuscript
[M1] Sunpill Kim, Hoyong Shin, and Jae Hong Seo*
Deep Face Template Protection in the Wild
Under Review
Proceeding
[P2] Jae Hong Seo
Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11975, Springer 2020,
[P1] Keita Emura, Jae Hong Seo, and Yohei Watanabe
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018. ACM 2018
Journal
[J26] Sungwook Kim, Gwangwoon Lee, Hyeonbum Lee and Jae Hong Seo*
Leopard: Sublinear Verifier Inner Product Argument under Discrete Logarithm Assumption
IEEE Transactions on Information Forensics and Security (IEEE TIFS) (link)
[J25] Hyung Tae Lee and Jae Hong Seo*
One the Security of Functional Encryption in the Generic Group Model
Designs, Codes and Cryptography (DCC), Vol 91, pages 3081–3114, 2023 (link)
[J24] Bora Jeong, Sunpill Kim, Seunghun Paik and Jae Hong Seo*
Analysis on Secure Triplet Loss
IEEE Access, Vol.10, November 2022 (link)
[J23] Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, and Jae Hong Seo*; [alphabetical order]
Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger.
IEEE Access, Vol.10 , April 2022 (link), ePrint Archive (https://eprint.iacr.org/2020/735)
[J22] Chanyang Ju , Hyeonbum Lee , Heewon Chung , Jae Hong Seo, and Sungwook Kim,
Efficient Sum-Check Protocol for Convolution
IEEE Access, Vol. 9, Dec 2021 (link)
[J21] Keita Emura, Jae Hong Seo, and Yohei Watanabe; [alphabetical order]
Efficient Revocable Identity-based Encryption with Short Public Parameters
Theoretical Computer Science (TCS), Vol. 863, pp 127-155, April 2021 (link)
[J20] Hyung Tae Lee, San Ling, Jae Hong Seo*, Huaxiong Wang, and Taek-Young Youn; [alphabetical order]
Public key encryption with equality test in the standard model.
Information Sciences, Vol. 516, pp 89--108, March 2020.
[J19] Jae Hong Seo*
Efficient Digital Signatures from RSA without Random Oracles
Information Sciences, Vol. 512, pp 471--480, March 2020 . DOI
[J18] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]
Public Key Encryption with Equality Test from Generic Assumptions in the Random Oracle Model
Information Sciences, Vol.500, pp 15--33, 2019. DOI
[J17] Sungwook Kim, Jinsu Kim, and Jae Hong Seo*
A New Approach for Practical Function-Private Inner Product Encryption.
Theoretical Computer Science (TCS), Vol. 783, pp 22--40, September 2019. DOI
[J16] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
International Journal of Information Security (IJIS), Vol.17(2), pp193--220, 2018
[J15] Jinsu Kim, Sungwook Kim, and Jae Hong Seo*; [alphabetical order]
A new Scale-Invariant Homomorphic Encryption Scheme.
Information Sciences, Vol.422, pp 177--187, 2018
[J14] Jae Hong Seo*
Short Signatures from Diffie–Hellman: Realizing Almost Compact Public Key
Journal of Cryptology (JoC), Volume 30, Issue 3, pp 735--759, July 2017. DOI
[J13] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]
Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test
Information Sciences, Vol.373, pp 419--440, 2016.
[J12] Hyung Tae Lee, San Ling, Jae Hong Seo* and Huaxiong Wang; [alphabetical order]
CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test
The Computer Journal, 59(11), pp 1689--1694, 2016.
[J11] Jae Hong Seo and Keita Emura,
Revocable hierarchical identity-based encryption via history-free approach
Theoretical Computer Science (TCS), Vol.615, pp45--60, 2016. DOI
[J10] Keita Emura, Jae Hong Seo*, and Taek-Young Youn; [alphabetical order]
Semi-generic Transformation of Revocable Hierarchical Identity-Based Encryption and its DBDH Instantiation
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.1,
pp83--91, Jan. 2016.
[J9] Jae Hong Seo and Keita Emura
Revocable Identity-Based Encryption with Rejoin Functionality
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E97-A, No.8,
pp1806--1809, Aug. 2014.
[J8] Jae Hong Seo and Keita Emura
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions
IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol.9(7), pp1193--1205, 2014. DOI
[J7] Jae Hong Seo and Keita Emura
Revocable Hierarchical Identity-Based Encryption
Theoretical Computer Science (TCS), Vol.542, pp44--62, 2014. DOI
[J6] Jae Hong Seo and Keita Emura
A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp2282--2285, Nov. 2013.
[J5] Jae Hong Seo and Keita Emura
On Discrete Logarithm based Additively Homomorphic Encryption
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp. 2286--2289, Nov. 2013.
[J4] Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo*; [alphabetical order]
Multi-Party Privacy-Preserving Set Intersection with Quasi-linear Complexity
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.8, pp.1366--1378, Aug. 2012.
[J3] Jae Hong Seo
Short Round Sub-linear Zero-Knowledge Argument for Linear Algebraic Relations
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.4, pp.776--789, Apr. 2012.
[J2] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.45--56, Jan. 2011.
[J1] Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, and Dowon Hong
Analysis of Privacy-Preserving Element Reduction of a Multiset
Journal of the Korean Mathematical Society (JKMS), Vol.46, No.1, pp.59--69, 2009.
Conference
[C22] Seunghun Paik, Dongsoo Kim, Chanwoo Hwang, Sunpill Kim, and Jae Hong Seo
Towards Certifiably Robust Face Recognition
ECCV 2024
[C21] Hyeonbum Lee, Kyuhwan Lee, Wenyi Tang, Shankha Shubhra Mukherjee, Jae Hong Seo, and Taeho Jung
PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain
IEEE ICBC 2024
[C20] Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, and Jae Hong Seo*
Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems
To appear in the proceeding of the 45th IEEE Symposium on Security and Privacy (S&P 2024) (acceptance rate = 14.9%)
[C19] Seunghun Paik, Sunpill Kim, and Jae Hong Seo*,
Security Analysis on Locality-Sensitive Hashing-Based Biometric Template Protection Schemes
The 34th British Machine Vision Conference (BMVC), 2023 (Oral)
[C18] Hyeonbum Lee and Jae Hong Seo*; [alphabetical order]
TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup
IWSEC 2023 (link)
[C17] Sungwook Kim, Hyeonbum Lee, and Jae Hong Seo*; [alphabetical order]
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
IACR-ASIACRYPT 2022 (link) (acceptance rate = 27%), ePrint Archive (https://eprint.iacr.org/2021/1450)
[C16] Chanyang Ju, Wenyi Tang, Changhao Chenli, Gwangwoon Lee, Jae Hong Seo, and Taeho Jung
Monitoring Provenance of Delegated Personal Data With Blockchain
IEEE Blockchain 2022 (link) (acceptance rate = 15.8%)
[C15] Sunpill Kim, Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and Jae Hong Seo*,
IronMask: Modular Architecture for Protecting Deep Face Template
Conference on Computer Vision and Pattern Recognition (CVPR) 2021 (link)
[C14] Yohei Watanabe, Keita Emura, and Jae Hong Seo
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
CT-RSA 2017 (DOI)
[C13] Jae Hong Seo and Keita Emura
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption
IWSEC 2015 (DOI).
[C12] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
ACNS 2015 (DOI).
[C11] Jae Hong Seo and Keita Emura
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
CT-RSA 2015 (DOI) (acceptance rate = 23.4%).
[C10] Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo; [alphabetical order]
A New Additive Homomorphic Encryption based on the co-ACD Problem
ACM-CCS 2014 (DOI) (acceptance rate = 19.5%).
[C9] Hyung Tae Lee and Jae Hong Seo*; [alphabetical order]
Security Analysis of Multilinear Maps over the Integers
IACR-CRYPTO 2014 (DOI) (acceptance rate = 26%).
[C8] Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo*, and Christoph Striecks; [alphabetical order]
Practical Signatures from Standard Assumptions
IACR-EUROCRYPT 2013 (link) (acceptance rate = 20%).
[C7] Jae Hong Seo and Keita Emura
Revocable Identity-Based Encryption, Revisited: Security Definition and Construction
IACR-PKC 2013 (link) (acceptance rate = 28%).
[C6] Jae Hong Seo and Keita Emura
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption
CT-RSA 2013 (link) (acceptance rate = 28%).
[C5] Jae Hong Seo
On the (Im)possibility of Projecting Property in Prime-Order Setting
IACR-ASIACRYPT 2012 (link) (acceptance rate = 17%).
[C4] Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz
Constant-Round Multi-Party Private Set Union using Reversed Laurent Series
IACR-PKC 2012 (DOI) (acceptance rate = 22%).
[C3] Jae Hong Seo and Jung Hee Cheon
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
IACR-TCC 2012 (link) (acceptance rate = 27%).
[C2] Jae Hong Seo
Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra
IACR-PKC 2011 (acceptance rate = 27%).
[C1] Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
IACR-PKC 2009 (acceptance rate = 25%).