Professor, Kookmin University && CTO, Zkrypto
Lab URL : sites.google.com/site/itspkmu Company URL : www.zkrypto.com
Email: jihyek@kookmin.ac.kr
Education
Ph.D. in Information and Computer Science, UC Irvine, 2008 (Co-advised by Gene Tsudik and Stanislaw Jarecki)
M.S. in Electrical Engineering and Computer Science, Seoul National University, Korea, 2003
B.S. in Computer Engineering, Seoul National University, Korea, 1999
Employment Experience
2021.01 ~ Current CTO at Zkrypto Company
2011.09 – Current Professor in EE department, Kookmin University
2008.11 – 2011.08 Post-doctoral Researcher, Research Institute of Mathematics, Seoul National University (Hosted by Prof. Junghee Cheon)
Research Interests
Security and Privacy, Applied Cryptography, Zero knowledge Proofs
Projects
2021~2026 : 하드웨어 중심 신뢰계산기반과 분산 데이터보호박스를 위한 표준 프로토콜 개발 (과기정통부, IITP)
2021~2026 : 간결한 비대화형 연산 증명 시스템(SNARK)을 위한 암호 원천 기술 개발 (과기정통부, IITP)
2021~2025 : 암호화 및 영지식 증명 기반 고성능 블록체인 프라이버시 보호 기술 개발 (과기정통부, IITP)
2021~2025 : 고성능/대용량 트랜잭션 지원 블록체인 확장성 기술 연구 (과기정통부, IITP)
함수서명 설계기법 및 응용 기술 연구 (IITP) (종료)
영상 정보 프라이버시 침해 방지 및 인증 기법 (IITP) (종료)
효율적인 전방향 안전 인증 기술 연구 (NRF) (종료)
SSEV 특화 전문인력 양성 사업단 (IITP) (종료)
유비쿼터스 네트워크 환경에 적합한 비밀 인증 프로토콜 연구 (NRF) (종료)
준동형 암호를 이용한 클라우드 암호기술 연구 (국가보안기술연구소) (종료)
Conferences
Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim: DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. AsiaCCS 2025
Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim: zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. AsiaCCS 2024
Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh: SAVER: SNARK-comparible Verifiable Encryption. Financial Cryptography 2024
Sungwook Kim, Seongju Kim, Yurim Shin, Sunmi Kim, Jihye Kim and Hyunok Oh: Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS 2023
Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh: Succinct Zero-Knowledge Batch Proofs for Set Accumulators. CCS 2022: 455-469
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, and Hyunok Oh, "Efficient Verifiable Image Redacting based on zk-SNARKs", will appear in AsiaCCS 2021
Thomas Haywood Dadzie, Jiwon Lee, Jihye Kim, and Hyunok Oh, "SA-SPM: An Efficient Compiler for Security Aware Scratchpad Memory (Invited Paper)", LCTES 2019 Languages, Compilers, Tools and Theory of Embedded Systems, Phoenix, Arizona, United States, June 23, 2019
Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim and Hyunok Oh, "Forward Secure Identity-based Signature Scheme with RSA", the 34th IFIP International Information Security and Privacy Conference (IFIP SEC 2019), Lisbon, Portugal, June 25-27, 2019
Jihye Kim, Hankyung Ko, Hyunok Oh, "AILocker: Authenticated Image Locker for Video", The 34th ACM/SIGAPP Symposium On Applied Computing (SAC), Limassol, Cyprus, April 8-12, 2019
Thomas Ekow Haywood-Dadzie, Jihye Kim, Hyunok Oh, "Secure Non-volatile Memory with Scratch Pad Memory using Dual Encryption Mode," International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), Torino, Italy, Sep. 30- Oct. 2 2018 (WIP)
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh, "Scalable Wildcarded Identity-Based Encryption," The 23rd European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 3-7 2018
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh, "Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast," The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC), Pau, France, April 9 - 13, 2018
Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, Hyunok Oh, "PASS: Privacy Aware Secure Signature Scheme for Surveillance Systems," 14th IEEE International Conference on Advanced Video and Signal based Surveillance (AVSS), Aug 29, 2017 - Sep 1 , 2017, Lecce, Italia
Jihye Kim, Hyunok Oh, "Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers", the 32nd IFIP International Information Security and Privacy Conference (IFIP SEC 2017), Rome, Italy, May 2017
Jihye Kim, Wonwoo Yang, Seunghwa Lee, Wonjoon Hwang, "Mediated aggregate signature schemes in wireless sensor networks", SECON Workshops 2015: 7-12
Myungsun Kim and Jihye Kim*, “Privacy-preserving Web Search”, International Conference on Ubiquitous and Future Networks, July, 2012.
Emiliano Cristofaro, Jihye Kim*, and Gene Tsudik, “Linear-Complexity Private Set Intersection Protocols”, Asiacrypt, December, 2010.
Emiliano Cristofaro, Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Privacy-preserving Policy-based Information Transfer”, The 9th Privacy Enhancing Technologies Symposium (PET), August, 2009.
Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, and Kunsoo Park, “Fair Threshold Decryption with Semi-Trusted Third Parties”, Australasian Conference on Information Security and Privacy (ACISP), July, 2009.
Jihye Kim, and Gene Tsudik, “Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks”, International Conference on Information Security and Cryptology (ICISC), 2008.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange”, RSA Conference, Cryptographers’ Track (CT-RSA), 2008.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Authenticated Group Agreement Protocols with a Privacy Property of Affiliation-Hiding”, RSA Conference, Cryptographers’ Track (CT-RSA), 2007.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Robust Group Key Agreement using Short Broadcasts”, 14th ACM Conference on Computer and Communications Security (CCS), 2007.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Authentication for Paranoids: Group Secret Handshakes”, Lecture Notes on Computer Science, 2006.
Jihye Kim, and Gene Tsudik, “SRDP: Securing Route Discovery in DSR”, 2nd International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), 2005
Claud Castelluccia, Stanislaw Jarecki, Jihye Kim, and Gene Tsudik, “A Robust Multi-signature Scheme with Applications to Multicast Acknowledgement Aggregation”, Lecture Notes on Computer Science, 2004.
Journals
Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh: Hadamard Product Arguments and Their Applications. IEEE Access (2025)
Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh: vCNN: Verifiable Convolutional Neural Network. IEEE Transactions on Dependable and Secure Computing (2024)
Daehyeon Lee, Ohsuk Shin, Yeonghyeon Cha, Junghee Lee, Taisic Yun, Jihye Kim, Hyunok Oh, Chrysostomos Nicopoulos, Sang Su Lee: A Hardware-Based Correct Execution Environment Supporting Virtual Memory. IEEE Access 12: 114008-114022 (2024)
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh: Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts. IEEE Access 11: 56463-56480 (2023)
Jeonghyuk Lee, Jihye Kim, Hyunok Oh: Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs. IEEE Access 9: 97705-97717 (2021)
J. Lee, C. Nicopoulos, G. Jeong, J. Kim and H. Oh, "Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment," in IEEE Access, vol. 8, pp. 216689-216706, 2020
Jihye Kim, Jiwon Lee, Hyunok Oh: Simulation-Extractable zk-SNARK With a Single Verification. IEEE Access 8: 156569-156581, 2020
Lee, J.; Lee, S.; Kim, J.; Oh, H. Scalable Wildcarded Identity-Based Encryption with Full Security. Electronics 2020, 9, 1453.
Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh : Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption. Sensors 20(11): 3140 (2020)
Jiwon Lee, Jihye Kim, Hyunok Oh. 2020. "BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipment." Electronics. 2020; 9, no. 9: 1389.
Haywood Dadzie T, Lee J, Kim J, Oh H. NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory. Electronics. 2020; 9(8):1304
Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Gwonho Jeong and Hyunok Oh, "Authcropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems", ACM Trans. Embed. Comput. Syst., Vol. 18, No. 5s, Article 62, Publication date: October 2019
Jihye Kim, Hyunok Oh, "FAS: Forward Secure Sequential Aggregate Signatures for Secure Logging", Volume 471, Pages 115-131, Information Sciences, January 2019
Hyunok Oh, Jihye Kim, and Jisun Shin, "Forward-Secure ID based Digital Signature Scheme with Forward-Secure Private Key Generator", Volumes 454–455, Pages 96-109, Information Sciences, July 2018 https://doi.org/10.1016/j.ins.2018.04.049
Hyunok Oh and Jihye Kim, "An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory", IEEE Transactions on Computers, Volume 63, Issue 4, Page 820-832, April 2014.
Hyunok Oh and Jihye Kim, "Design Space Exploration using Answer Set Programming", Information-an international interdisciplinary journal, International Information Institute, vol 16, no 9(B), pp 7219-7227, Sep., 2013
Hyunok Oh and Jihye Kim, "Minimization of Both Buffer Memory Size and Buffer Memory Management Overhead for A Synchronous Dataflow Graph", Information-an international interdisciplinary journal, International Information Institute, vol 16, no 9(B), pp 7235-7247, Sep., 2013.
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon, "Constant-Round Privacy Preserving Multiset Union", Bulletin of the Korean Mathematical Society, Volume 50, Issue 6, 2013, pp.1799-1816
Myungsun Kim, Jihye Kim, and Jung Hee Cheon, “Compress Multiple Ciphertexts using ElGamal Encryption Schemes”, Journal of the Korean Mathematical Society, 50, No. 2, pp.361-377, June 2013
Sungwook Kim, Jihye Kim and Jung Hee Cheon, Seong-ho Ju, “Threshold Signature Schemes for ElGamal Variants”, Computer Standards & Interfaces, Volume 33, Issue 4, 432-437, June 2011.
Stanislaw. Jarecki, Jihye Kim*, and Gene Tsudik, “Flexible Robust Group Key Agreement”, IEEE Transactions on Parallel and Distributed Systems, Volume 22, Issue 5, 879-886, May, 2011.
Emiliano De Cristofaro and Jihye Kim*, “Some like it private: sharing confidential information based on oblivious authorization”, IEEE Security and Privacy, Volume 8, Number 4, 18-24, August, 2010.
Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, and Kunsoo Park, “Fair Threshold Decryption with Semi-Trusted Third Parties”, International Journal of Cryptography, Volume 2, Number 2, 2010
Jihye Kim, and Gene Tsudik, “SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs”, Ad Hoc Networks, Volume 7, Issue 6, pp 1097-1109, August, 2009.
Claud Castelluccia, Stanislaw Jarecki, Jihye Kim, and Gene Tsudik, “Secure Acknowledgement Aggregation and Multi-signatures with Limited Robustness”, Computer Networks, Special Issue on Algorithms for Distributed Systems, Volume 50, Number 10, July 2006, pp. 1639-1652.
국내 등록특허
비밀 선거가 보장된 블록체인 기반의 전자 투표를 수행하는 단말 장치 및 서버와 전자 투표, 등록번호 10-2144614, 등록일 2020.08.07
객체 인식 기반 영상 인증 방법 및 그 장치, 등록번호 10-2101557, 등록일 2020.04.09
영상 절삭 지원 인증 방법, 복호화 방법 및 그 장치, 등록번호 10-2016844, 2019-08-26
영상 인증 방법 및 그 장치 image authentication method and apparatus. 등록번호 10-1979102, 2019-05-10
와일드 카드를 포함하는 키 발급, 암호화 및 복호화 방법 Wildcard identity-based key derivation, encryption and decryption method, 등록번호 10-1951545, 2019-02-18
부분집합 차 기반 브로드캐스트 암호화 및 복호화 방법 Broadcast encryption and decryption method based on subset difference, 등록번호 10-1967521, 2019-04-03
시큐어로깅을 위한 포워드시큐어 압축 서명 장치 및 방법, 등록번호 10-1703880, 등록일 2017.02.01
이정혁, 김지혜, 오현옥, "전방향 안전서명을 사용하는 빠른 블록체인 합의 알고리즘", 정보과학회논문지, pp. 397-404, 2019년 5월
윤정준, 이정혁, 김지혜, 오현옥, "보안 하드웨어 연산 최소화를 통한 효율적인 속성 기반 전자서명 구현", 정보과학회논문지 44(4), 344-351, 2017.4
양원우, 김지혜, "Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터", 정보보호학회논문지 25(6), 1341-1351, 2015.12
손지수, 조수연, 오현옥, 김지혜, "zk-SNARK를 이용한 프라이버시 보장 온체인 블록체인 연구", 한국정보과학회 2019 한국컴퓨터종합학술대회 논문집, 2019.06, 1,978 - 1,980
김동혁, 김지혜, 오현옥, "전방향 안전 서명을 보장하는 Proof of Elapsed Time", 한국정보과학회 동계학술대회, pp. 950 - 952, 2018. 12. (한국컴퓨터종합학술대회 우수논문상)
이정혁, 김예지, 조수연, 오현옥, 김지혜, "전방향 안전서명을 사용하는 빠른 블록체인", 한국정보과학회 하계학술대회, 2018 (한국컴퓨터종합학술대회 우수논문상)
최재경, 이인근, 김종호, 이승화, 김지혜, 오현옥, "검증 가능한 계산을 위한 zk-SNARK에 대한 분석", 한국정보과학회 하계학술대회, 2018
오동환, 한세민, 정권호, 오현옥, 김지혜, "신원 기반 서명을 활용한 ECU 펌웨어 폐기 기법", 한국정보과학회 하계학술대회, 2018
김승리, 이정혁, 구슬예, 오현옥, 김지혜, "블록체인 기반 에너지 거래 모델 연구", 한국정보보호학회 동계학술대회, 2018
윤정준, 김지혜, 오현옥, "블록체인 기술 동향 및 응용", 한국정보보호학회 하계학술대회, 2017
이정혁, 김지혜, 오현옥, "이더리움의 분석 및 응용기법", 한국정보보호학회 하계학술대회, 2017
김승리, 김지혜, 오현옥, 이승화, "전자 암호 화폐의 프라이버시 이슈와 동향", 한국정보보호학회 하계학술대회, 2017
윤정준, 이정혁, 김지혜, 오현옥, "최소 보안 연산을 가지는 전방향 보안 전자서명", 한국정보과학회 2016 한국컴퓨터종합학술대회, 제주 ICC, 2016년 6월 29일~ 7월 1일. (2016 한국정보보호종합학술대회 우수논문상)
2023: 국가암호공모전 특별상:김종호, 이준희, 오현옥, 김지혜, "zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain"
2021: 국가암호공모전 최우수상: 정권호, 오현옥, 이누리, 김지혜, "Azeroth: Auditable Zero-knowledge Transaction in Smart Contracts"
2020: 국가암호공모전 우수상: 고한경, 이인근, 이승화, 김지혜, 오현옥, "Efficient Verifiable Image Redacting based on zk-SNARKs"
2019: 국가암호공모전 특별상: 이지원, 김지혜, 오현옥, "SE-SNARK with a single verification"
2018: 국가암호공모전 장려상: 이승화, 김지혜, 오현옥, "Efficient zkSNARK for Convolution"
2018: 한국컴퓨터종합학술대회 우수논문상: 김동혁, 김지혜, 오현옥, "전방향 안전 서명을 보장하는 Proof of Elapsed Time", 한국정보과학회 동계학술대회
2017: 국가암호공모전 특별상: 이지원, 오현옥, 이승화, 김지혜, "Wildcard Based Identity Based Encryption with Constant Size Ciphertext"
2016: 국가암호공모전 우수상: 이지원, 오현옥, 이승화, 김지혜, "Combinatorial Subset Difference Public Key Broadcast Encryption Scheme"
2016 한국정보보호종합학술대회 우수논문상