Representative Publication

1. Y. Lee (joint work with A. Boldyreva, N. Chanette, and A. O'Neill), "Order Preserving Symmetric Encryption", In proceedings of EUROCRYPT'09, 2009.

This work initiates the research on finding a secure cryptographic tool enabling efficient comparison operation over encrypted data. The paper has been cited more than 1200 times according to Google Scholar. (Thanks to Prof. Sasha for the image)

 

2. Y. Lee, Y. Seo, Y. Nam, J, Chae, and J. Cheon, "HEaaN-STAT: a privacy-preserving statistical analysis toolkit for large-scale numerical, ordinal, and categorical data",  IEEE Transaction on Dependable and Secure Computing, 2023.

Statistical analysis of largescale data is useful as it enables the extraction of a large amount of information, despite its simplicity. Therefore, fusing and analyzing data from different security domains is an attractive and promising approach, unless it jeopardizes the privacy of the data in any security domain. In this study, we proposed the HEaaN-STAT toolkit that can efficiently fuse data from different domains to enable largescale statistical analysis while protecting data privacy. Moreover, we proposed an efficient inverse operation and a table lookup function for Cheon-Kim-Kim-Song (CKKS) encrypted data, as well as a data encoding method for counting encrypted data. Based on this, we proposed a method for generating a contingency table with a large number of cases and k-percentile for largescale data that is hundreds to thousands of times faster than the method proposed by Lu et al. in NDSS’ 17. The validity of the proposed toolkit was verified through practical use for business applications using real-world data. 

 The initial version of HEaaN.stat (https://heaan.it/)  was developed based on the techniques shown in the paper.  

3. W. Jung, S. Kim, J. Ahn, J. Cheon, and Y. Lee, "Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. ", In Proc. CHES 21, 2021. 

We have demonstrated that very fast CKKS HE operations are possible including the bootrapping operation with the help of GPU. We also have figured out the importance of the memory bandwitdh for efficient HE operations. 

4. S. Hong, S. Kim, J. CHoi, Y. Lee, and J. Cheon, "Efficient Sorting of Homomorphic Encrypted Data with k-Way Sorting Network", IEEE Transactions on Information Forensics and Security, 2021.

We have found an efficient sorting method over encrypted data by applying k-way sorting network to the encrypted data by CKKS. With the help of efficient data comparison method and SIMD operations supported by CKKS HE, we could sort tens of thousands of data very quickly.

 5. J. Jang, A. Kim, B. Na, Younho Lee, D. Yhee, B. Lee, J. Cheon, S. Yoon, "Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption", ASIACCS, 2022. 

Making deep neural networks available as a service introduces privacy problems, for which homomorphic encryption of both model and user data potentially offers the best solution. However, the difficulty of operating on homomorphically encrypted data has hither to limited the range of operations available and the depth of networks. We introduce an extended CKKS scheme MatHEAAN to provide efficient matrix representations and operations together with improved noise control. Using the MatHEAAN we developed a deep sequential model with a gated recurrent unit called MatHE-GRU. We evaluated the proposed model using sequence modeling, regression, and classification of images and genome sequences. We show that the hidden states of the encrypted model, as well as the results, are consistent with a plaintext model.

6. Y. Lee, "Secure Ordered Bucketization", IEEE Transactions on Secure and Dependable Computing, May, 2014.

The author in this work has found a very simple and efficient way to provide order-comparison operation over encrypted data while strengthening the level of security compared to the existing works.  The proposed work utilizes a simple bucketing approach that is a common method for securing database systems, as well as, reducing the complexity of the data to enable efficient search operations.

7. D. Choi and Y. Lee, "Eavesdropping one-time token over magnetic secure transmission in Samsung Pay", in proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT'16), Aug., 2016. 

We have discovered a security vulnerability in the Samsung Pay app. We could successfully eavesdropp the one-time token for a payment made on the Samsung Pay app around 0.6m ~ 2.0m from where the payment was taking place, and have verified that the collected one-time token could be used away from the victim device after transmitting the collected payment information over the Internet.


The rest of my publication is here