Publications

Manuscript

[M1]  Sunpill Kim, Hoyong Shin, and Jae Hong Seo*

Deep Face Template Protection in the Wild

Under Review

Proceeding

[P2] Jae Hong Seo

Information Security and Cryptology - ICISC 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11975, Springer 2020, 

[P1]  Keita Emura, Jae Hong Seo, and Yohei Watanabe

Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018. ACM 2018

Journal

[J26] Sungwook Kim, Gwangwoon Lee, Hyeonbum Lee and Jae Hong Seo*

Leopard: Sublinear Verifier Inner Product Argument under Discrete Logarithm Assumption 

IEEE Transactions on Information Forensics and Security (IEEE TIFS) (link)

[J25] Hyung Tae Lee and Jae Hong Seo*

One the Security of Functional Encryption in the Generic Group Model

Designs, Codes and Cryptography (DCC), Vol 91, pages 3081–3114, 2023 (link)

[J24] Bora Jeong, Sunpill Kim, Seunghun Paik and Jae Hong Seo*

Analysis on Secure Triplet Loss

IEEE Access, Vol.10,  November 2022 (link)

[J23] Heewon Chung, Kyoohyung Han, Chanyang Ju, Myungsun Kim, and Jae Hong Seo*; [alphabetical order]

Bulletproofs+: Shorter Proofs for a Privacy-Enhanced Distributed Ledger.

IEEE Access, Vol.10 , April 2022 (link), ePrint Archive (https://eprint.iacr.org/2020/735)

[J22]  Chanyang Ju , Hyeonbum Lee , Heewon Chung , Jae Hong Seo, and Sungwook Kim, 

Efficient Sum-Check Protocol for Convolution

IEEE Access, Vol. 9, Dec 2021 (link

[J21] Keita Emura, Jae Hong Seo, and Yohei Watanabe; [alphabetical order]

  Efficient Revocable Identity-based Encryption with Short Public Parameters

Theoretical Computer Science (TCS),  Vol. 863, pp 127-155, April 2021 (link)

[J20]  Hyung Tae Lee, San Ling, Jae Hong Seo*, Huaxiong Wang, and Taek-Young Youn; [alphabetical order]

Public key encryption with equality test in the standard model. 

Information Sciences,  Vol. 516, pp 89--108, March 2020.

[J19] Jae Hong Seo*

Efficient Digital Signatures from RSA without Random Oracles

Information Sciences,  Vol. 512, pp 471--480, March 2020 . DOI

[J18] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]

Public Key Encryption with Equality Test from Generic Assumptions in the Random Oracle Model 

Information Sciences, Vol.500, pp 15--33, 2019. DOI

[J17] Sungwook Kim, Jinsu Kim, and Jae Hong Seo*

A New Approach for Practical Function-Private Inner Product Encryption.

Theoretical Computer Science (TCS), Vol. 783,  pp 22--40, September 2019. DOI

[J16] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.

International Journal of Information Security (IJIS), Vol.17(2), pp193--220, 2018

[J15] Jinsu Kim, Sungwook Kim, and Jae Hong Seo*; [alphabetical order]

A new Scale-Invariant Homomorphic Encryption Scheme.

Information Sciences, Vol.422, pp 177--187, 2018

[J14] Jae Hong Seo*

         Short Signatures from Diffie–Hellman: Realizing Almost Compact Public Key

         Journal of Cryptology (JoC), Volume 30, Issue 3, pp 735--759, July 2017. DOI

[J13] Hyung Tae Lee, San Ling, Jae Hong Seo*, and Huaxiong Wang; [alphabetical order]

         Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test

         Information Sciences, Vol.373, pp 419--440, 2016.

[J12] Hyung Tae Lee, San Ling, Jae Hong Seo* and Huaxiong Wang; [alphabetical order]

         CCA2 attack and modification of Huang et al.'s public key encryption with authorized equality test

         The Computer Journal, 59(11), pp 1689--1694, 2016.

[J11] Jae Hong Seo and Keita Emura, 

         Revocable hierarchical identity-based encryption via history-free approach

         Theoretical Computer Science (TCS), Vol.615,  pp45--60, 2016. DOI

[J10] Keita Emura, Jae Hong Seo*, and Taek-Young Youn; [alphabetical order]

          Semi-generic Transformation of Revocable Hierarchical Identity-Based Encryption and its DBDH Instantiation

          IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E99-A, No.1,
          pp83--91, Jan. 2016.

[J9]  Jae Hong Seo and Keita Emura

 Revocable Identity-Based Encryption with Rejoin Functionality

 IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E97-A, No.8,  
  pp1806--1809, Aug. 2014.

[J8]  Jae Hong Seo and Keita Emura

Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions

IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol.9(7), pp1193--1205, 2014. DOI 

[J7]  Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption

Theoretical Computer Science (TCS), Vol.542, pp44--62, 2014. DOI

[J6]  Jae Hong Seo and Keita Emura

A Remark on "Efficient Revocable ID-Based Encryption with a Public Channel"

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp2282--2285, Nov. 2013.

[J5]  Jae Hong Seo and Keita Emura

On Discrete Logarithm based Additively Homomorphic Encryption

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.11, pp. 2286--2289, Nov. 2013.

[J4]  Jung Hee Cheon, Stanislaw Jarecki, and Jae Hong Seo*; [alphabetical order]

Multi-Party Privacy-Preserving Set Intersection with Quasi-linear Complexity

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.8, pp.1366--1378, Aug. 2012.

[J3]  Jae Hong Seo

Short Round Sub-linear Zero-Knowledge Argument for  Linear Algebraic Relations

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E95-A, No.4, pp.776--789, Apr. 2012.

[J2]  Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts

IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.45--56, Jan. 2011.

[J1]  Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, and Dowon Hong

Analysis of Privacy-Preserving Element Reduction of a Multiset

Journal of the Korean Mathematical Society (JKMS), Vol.46, No.1, pp.59--69, 2009.


Conference

[C22] Seunghun Paik, Dongsoo Kim, Chanwoo Hwang, Sunpill Kim, and Jae Hong Seo

Towards Certifiably Robust Face Recognition

ECCV 2024

[C21] Hyeonbum Lee, Kyuhwan Lee, Wenyi Tang, Shankha Shubhra Mukherjee, Jae Hong Seo, and Taeho Jung

PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain

IEEE ICBC 2024

[C20] Sunpill Kim, Yong Kiam Tan, Bora Jeong, Soumik Mondal, Khin Mi Mi Aung, and Jae Hong Seo*

Scores Tell Everything about Bob: Non-adaptive Face Reconstruction on Face Recognition Systems

To appear in the proceeding of the 45th IEEE Symposium on Security and Privacy (S&P 2024) (acceptance rate = 14.9%)

[C19]  Seunghun Paik, Sunpill Kim, and Jae Hong Seo*,

Security Analysis on Locality-Sensitive Hashing-Based Biometric Template Protection Schemes

The 34th British Machine Vision Conference (BMVC), 2023 (Oral)

[C18] Hyeonbum Lee  and Jae Hong Seo*; [alphabetical order]

TENET : Sublogarithmic Proof, Sublinear Verifier Inner Product Argument without a Trusted Setup

IWSEC 2023 (link

[C17] Sungwook Kim, Hyeonbum Lee, and Jae Hong Seo*; [alphabetical order]
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier
IACR-ASIACRYPT 2022 (link) (acceptance rate = 27%), ePrint Archive (https://eprint.iacr.org/2021/1450)

[C16] Chanyang Ju, Wenyi Tang, Changhao Chenli, Gwangwoon Lee, Jae Hong Seo, and Taeho Jung

Monitoring Provenance of Delegated Personal Data With Blockchain

IEEE Blockchain 2022 (link) (acceptance rate = 15.8%)

[C15] Sunpill Kim,  Yunseong Jeong, Jinsu Kim, Jungkon Kim, Hyung Tae Lee, and Jae Hong Seo*

IronMask: Modular Architecture for Protecting Deep Face Template

Conference on Computer Vision and Pattern Recognition (CVPR) 2021 (link)

[C14] Yohei Watanabe, Keita Emura, and Jae Hong Seo

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters  

CT-RSA 2017 (DOI)

[C13] Jae Hong Seo and Keita Emura

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption          

IWSEC 2015 (DOI).

[C12] Jae Hong Seo, Keita Emura, Keita Xagawa, and Kazuki Yoneyama

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures

ACNS 2015 (DOI).

[C11] Jae Hong Seo and Keita Emura

Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts 

CT-RSA 2015 (DOI) (acceptance rate = 23.4%).

[C10] Jung Hee Cheon, Hyung Tae Lee, and Jae Hong Seo; [alphabetical order]

A New Additive Homomorphic Encryption based on the co-ACD Problem

ACM-CCS 2014 (DOI) (acceptance rate = 19.5%). 

[C9]  Hyung Tae Lee and Jae Hong Seo*; [alphabetical order]

Security Analysis of Multilinear Maps over the Integers

IACR-CRYPTO 2014 (DOI) (acceptance rate = 26%). 

[C8]  Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo*, and Christoph Striecks; [alphabetical order]

Practical Signatures from Standard Assumptions

IACR-EUROCRYPT 2013 (link) (acceptance rate = 20%).

[C7]  Jae Hong Seo and Keita Emura

Revocable Identity-Based Encryption, Revisited: Security Definition and Construction

IACR-PKC 2013 (link) (acceptance rate = 28%).

[C6]  Jae Hong Seo and Keita Emura

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption

CT-RSA 2013 (link) (acceptance rate = 28%).

[C5]  Jae Hong Seo

On the (Im)possibility of Projecting Property in Prime-Order Setting

IACR-ASIACRYPT 2012  (link) (acceptance rate = 17%).

[C4]  Jae Hong Seo, Jung Hee Cheon, and Jonathan Katz

Constant-Round Multi-Party Private Set Union using Reversed Laurent Series

IACR-PKC 2012 (DOI) (acceptance rate = 22%).

[C3]  Jae Hong Seo and Jung Hee Cheon

Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

IACR-TCC 2012 (link) (acceptance rate = 27%). 

[C2]  Jae Hong Seo

Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra

IACR-PKC 2011 (acceptance rate = 27%). 

[C1]  Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, and Koutarou Suzuki

Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts

IACR-PKC 2009 (acceptance rate = 25%).