default search action
Jong Hwan Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i14]Jonghyun Kim, Jong Hwan Park:
NTRU+PKE: Efficient Public-Key Encryption Schemes from the NTRU Problem. IACR Cryptol. ePrint Arch. 2024: 1282 (2024) - [i13]Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim:
Dynamic Threshold Key Encapsulation with a Transparent Setup. IACR Cryptol. ePrint Arch. 2024: 1311 (2024) - 2023
- [j45]Duc Anh Luong, Jong Hwan Park:
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK. IEEE Access 11: 1840-1853 (2023) - [j44]Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:
Practical dynamic group signatures without knowledge extractors. Des. Codes Cryptogr. 91(3): 853-893 (2023) - [j43]Jong Hwan Park:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). IET Inf. Secur. 17(1): 1-2 (2023) - [j42]Jonghyun Kim, Jong Hwan Park:
NTRU++: Compact Construction of NTRU Using Simple Encoding Method. IEEE Trans. Inf. Forensics Secur. 18: 4760-4774 (2023) - 2022
- [j41]Duc Anh Luong, Jong Hwan Park:
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK. IEEE Access 10: 55739-55752 (2022) - [j40]Sangsoo Seol, Hyoseung Kim, Jong Hwan Park:
An Efficient Open Vote Network for Multiple Candidates. IEEE Access 10: 124291-124304 (2022) - [e2]Jong Hwan Park, Seung-Hyun Seo:
Information Security and Cryptology - ICISC 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13218, Springer 2022, ISBN 978-3-031-08895-7 [contents] - [i12]Jonghyun Kim, Jong Hwan Park:
NTRU+: Compact Construction of NTRU Using Simple Encoding Method. IACR Cryptol. ePrint Arch. 2022: 1664 (2022) - [i11]Joo Woo, Kwangsu Lee, Jong Hwan Park:
GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsacks. IACR Cryptol. ePrint Arch. 2022: 1665 (2022) - 2021
- [j39]Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Improving the security of direct anonymous attestation under host corruptions. Int. J. Inf. Sec. 20(4): 475-492 (2021) - [j38]Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park:
Practical dynamic group signature with efficient concurrent joins and batch verifications. J. Inf. Secur. Appl. 63: 103003 (2021) - [i10]Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signatures Without Knowledge Extractors. IACR Cryptol. ePrint Arch. 2021: 351 (2021) - 2020
- [j37]Seungho Lee, Hyo Jin Jo, Wonsuk Choi, Hyoseung Kim, Jong Hwan Park, Dong Hoon Lee:
Fine-Grained Access Control-Enabled Logging Method on ARM TrustZone. IEEE Access 8: 81348-81364 (2020) - [j36]So Hyun Park, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials. IEEE Access 8: 112585-112597 (2020) - [j35]Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park:
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions. Des. Codes Cryptogr. 88(11): 2433-2452 (2020) - [j34]Minhye Seo, Suhri Kim, Dong Hoon Lee, Jong Hwan Park:
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method. Int. J. Inf. Sec. 19(4): 383-399 (2020) - [j33]Intae Kim, Jong Hwan Park, Seong Oun Hwang:
An efficient public key functional encryption for inner product evaluations. Neural Comput. Appl. 32(17): 13117-13128 (2020) - [j32]Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Tight security for the generic construction of identity-based signature (in the multi-instance setting). Theor. Comput. Sci. 847: 122-133 (2020) - [i9]Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications. IACR Cryptol. ePrint Arch. 2020: 921 (2020)
2010 – 2019
- 2019
- [j31]Kwangsu Lee, Jong Hwan Park:
Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions. IEEE Access 7: 60333-60347 (2019) - [j30]Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, Jong Hwan Park:
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication. IEEE Access 7: 69892-69906 (2019) - [j29]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. Comput. J. 62(4): 545-562 (2019) - [j28]Minhye Seo, Michel Abdalla, Dong Hoon Lee, Jong Hwan Park:
New technique for chosen-ciphertext security based on non-interactive zero-knowledge. Inf. Sci. 490: 18-35 (2019) - 2018
- [j27]Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, Jung Yeon Hwang:
Construction of a New Biometric-Based Key Derivation Function and Its Application. Secur. Commun. Networks 2018: 6107912:1-6107912:14 (2018) - 2017
- [j26]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient revocable identity-based encryption via subset difference methods. Des. Codes Cryptogr. 85(1): 39-76 (2017) - [j25]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. Theor. Comput. Sci. 667: 51-92 (2017) - [e1]Seokhie Hong, Jong Hwan Park:
Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10157, 2017, ISBN 978-3-319-53176-2 [contents] - 2016
- [j24]Jong Hwan Park, Dong Hoon Lee:
An efficient IBE scheme with tight security reduction in the random oracle model. Des. Codes Cryptogr. 79(1): 63-85 (2016) - [j23]Jong Hwan Park, Young-Ho Park:
A Tightly-Secure Multisignature Scheme with Improved Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(2): 579-589 (2016) - [j22]Jong Hwan Park, Dong Hoon Lee:
A Variant of Park-Lee Identity-Based Encryption System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(3): 720-732 (2016) - [j21]Ki Tak Kim, Jong Hwan Park, Dong Hoon Lee:
Selectively chosen ciphertext security in threshold public-key encryption. Secur. Commun. Networks 9(3): 189-200 (2016) - [j20]Intae Kim, Seong Oun Hwang, Jong Hwan Park, Chanil Park:
An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs. IEEE Trans. Computers 65(10): 2947-2958 (2016) - [i8]Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR Cryptol. ePrint Arch. 2016: 500 (2016) - 2015
- [j19]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with short ciphertexts: full security in prime order groups. Des. Codes Cryptogr. 74(2): 395-425 (2015) - [j18]Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem. Inf. Sci. 325: 256-270 (2015) - [i7]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups. CoRR abs/1502.07812 (2015) - [i6]Kwangsu Lee, Jong Hwan Park:
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions. IACR Cryptol. ePrint Arch. 2015: 921 (2015) - [i5]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. IACR Cryptol. ePrint Arch. 2015: 1202 (2015) - 2014
- [c11]Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited. ESORICS (2) 2014: 1-18 - [i4]Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient Revocable Identity-Based Encryption via Subset Difference Methods. IACR Cryptol. ePrint Arch. 2014: 132 (2014) - 2013
- [j17]Jin Ho Han, Jong Hwan Park, Dong Hoon Lee:
Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(4): 796-806 (2013) - [j16]Jong Hwan Park, Kwangsu Lee, Willy Susilo, Dong Hoon Lee:
Fully secure hidden vector encryption under standard assumptions. Inf. Sci. 232: 188-207 (2013) - [j15]Jong Hwan Park, Dong Hoon Lee:
Anonymous HIBE: Compact Construction Over Prime-Order Groups. IEEE Trans. Inf. Theory 59(4): 2531-2541 (2013) - [c10]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. ASIACRYPT (1) 2013: 235-254 - [i3]Jong Hwan Park, Dong Hoon Lee:
A New Practical Identity-Based Encryption System. IACR Cryptol. ePrint Arch. 2013: 23 (2013) - [i2]Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, Jong Hwan Park:
Public-Key Revocation and Tracing Schemes with Subset Difference Methods. IACR Cryptol. ePrint Arch. 2013: 228 (2013) - [i1]Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, Moti Yung:
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency. IACR Cryptol. ePrint Arch. 2013: 762 (2013) - 2012
- [j14]Kwangsu Lee, Jong Hwan Park, Dong Hoon Lee:
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1631-1636 (2012) - [j13]Hyun Sook Rhee, Jong Hwan Park, Dong Hoon Lee:
Generic construction of designated tester public-key encryption with keyword search. Inf. Sci. 205: 93-109 (2012) - [c9]Ki Tak Kim, Milyoung Kim, Hyoseung Kim, Jong Hwan Park, Dong Hoon Lee:
Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption. FGIT-EL/DTA/UNESST 2012: 99-102 - [c8]Hyoseung Kim, Seunghwan Park, Jong Hwan Park, Dong Hoon Lee:
Attribute-Based Encryption for Commercial Content Distribution. ICITCS 2012: 205-213 - 2011
- [j12]Kyu Young Choi, Jong Hwan Park, Dong Hoon Lee:
A new provably secure certificateless short signature scheme. Comput. Math. Appl. 61(7): 1760-1768 (2011) - [j11]Jong Hwan Park:
Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 58(3): 235-257 (2011) - [j10]Jong Hwan Park, Dong Hoon Lee:
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. Des. Codes Cryptogr. 60(3): 255-276 (2011) - [j9]Jong Soo Choi, Jean Hyoung Lee, Jong Hwan Park, Han Seung Nam, Hyuknam Kwon, Dongsoo Kim, Seung Woo Park:
Design and implementation of a seamless and comprehensive integrated medical device interface system for outpatient electronic medical records in a general hospital. Int. J. Medical Informatics 80(4): 274-285 (2011) - [j8]Jong Hwan Park, Hyun Sook Rhee, Dong Hoon Lee:
Fully collusion-resistant trace-and-revoke scheme in prime-order groups. J. Commun. Networks 13(5): 428-441 (2011) - [j7]Jong Hwan Park:
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data. IEEE Trans. Knowl. Data Eng. 23(10): 1483-1497 (2011) - 2010
- [j6]Jong Hwan Park, Dong Hoon Lee:
Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1269-1273 (2010) - [j5]Jong Hwan Park, Dong Hoon Lee:
A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(9): 1620-1631 (2010) - [j4]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5): 763-771 (2010)
2000 – 2009
- 2009
- [j3]Jong Hwan Park, Dong Hoon Lee:
Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 329-331 (2009) - [j2]Jong Hwan Park, Dong Hoon Lee:
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7): 1724-1726 (2009) - [c7]Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, Dong Hoon Lee:
Improved searchable public key encryption with designated tester. AsiaCCS 2009: 376-379 - 2008
- [j1]Jong Hwan Park, Hee Jean Kim, H.-M. Sung, Dong Hoon Lee:
Public Key Broadcast Encryption Schemes With Shorter Transmissions. IEEE Trans. Broadcast. 54(3): 401-411 (2008) - [c6]Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee:
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. AsiaCCS 2008: 373-380 - [c5]Jong Hwan Park, Dong Hoon Lee:
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ISPEC 2008: 101-115 - 2007
- [c4]Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee:
Efficient Certificateless Signature Schemes. ACNS 2007: 443-458 - [c3]Jong Hwan Park, Dong Hoon Lee:
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. EuroPKI 2007: 94-109 - [c2]Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). Pairing 2007: 60-82 - [c1]Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim:
Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 01:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint