Follow
Kwangsu Lee
Kwangsu Lee
Associate Professor, Sejong University
Verified email at sejong.ac.kr - Homepage
Title
Cited by
Cited by
Year
New DSA-verifiable signcryption schemes
JB Shin, K Lee, K Shim
Information Security and Cryptology—ICISC 2002, 35-47, 2003
1162003
Efficient revocable identity-based encryption via subset difference methods
K Lee, DH Lee, JH Park
Designs, Codes and Cryptography 85 (1), 39-76, 2017
802017
New constructions of revocable identity-based encryption from multilinear maps
S Park, K Lee, DH Lee
IEEE Transactions on Information Forensics and Security 10 (8), 1564-1577, 2015
752015
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
K Lee, SG Choi, DH Lee, JH Park, M Yung
Advances in Cryptology–ASIACRYPT 2013 8269, 235-254, 2013
622013
Sequential aggregate signatures with short public keys: Design, analysis and implementation studies
K Lee, DH Lee, M Yung
Public-Key Cryptography–PKC 2013, 423-442, 2013
382013
Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption”
K Lee
IEEE Transactions on Cloud Computing 8 (4), 1299-1300, 2020
342020
Revocable hierarchical identity-based encryption with shorter private keys and update keys
K Lee, S Park
Designs, Codes and Cryptography 86 (10), 2407-2440, 2018
342018
Aggregating CL-signatures revisited: Extended functionality and better efficiency
K Lee, DH Lee, M Yung
Financial Cryptography and Data Security–FC 2013, 171-188, 2013
332013
Patient-controlled attribute-based encryption for secure electronic health records system
J Eom, DH Lee, K Lee
Journal of Medical Systems 40 (12), 253, 2016
282016
Unbounded hierarchical identity-based encryption with efficient revocation
G Ryu, K Lee, S Park, DH Lee
WISA 2015, 122-133, 2015
282015
Self-updatable encryption with short public parameters and its extensions
K Lee
Designs, Codes and Cryptography 79 (1), 121-161, 2016
272016
Visual honey encryption: Application to steganography
JW Yoon, H Kim, HJ Jo, H Lee, K Lee
ACM Workshop on Information Hiding and Multimedia Security, 65-74, 2015
262015
A generic construction for revocable identity-based encryption with subset difference methods
K Lee
PLoS ONE 15 (9), e0239053, 2020
252020
Anonymous HIBE with short ciphertexts: Full security in prime order groups
K Lee, JH Park, DH Lee
Designs, Codes and Cryptography 74 (2), 395-425, 2015
242015
Fully secure hidden vector encryption under standard assumptions
JH Park, K Lee, W Susilo, DH Lee
Information Sciences 232, 188-207, 2013
232013
Improved hidden vector encryption with short ciphertexts and tokens
K Lee, DH Lee
Designs, Codes and Cryptography 58 (3), 297-319, 2011
222011
Two-input functional encryption for inner products from bilinear maps
K Lee, DH Lee
IEICE Transactions on Fundamentals of Electronics, 915-928, 2018
202018
Sequential aggregate signatures made shorter
K Lee, DH Lee, M Yung
Applied Cryptography and Network Security–ACNS 2013, 202-217, 2013
202013
Revocable hierarchical identity-based encryption with adaptive security
K Lee
Theoretical Computer Science 880, 37-68, 2021
182021
Public-key revocation and tracing schemes with subset difference methods revisited
K Lee, WK Koo, DH Lee, JH Park
European Symposium on Research in Computer Security–ESORICS 2014, 1-18, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20