New DSA-verifiable signcryption schemes JB Shin, K Lee, K Shim Information Security and Cryptology—ICISC 2002, 35-47, 2003 | 115 | 2003 |
Efficient revocable identity-based encryption via subset difference methods K Lee, DH Lee, JH Park Designs, Codes and Cryptography 85 (1), 39-76, 2017 | 85 | 2017 |
New constructions of revocable identity-based encryption from multilinear maps S Park, K Lee, DH Lee IEEE Transactions on Information Forensics and Security 10 (8), 1564-1577, 2015 | 76 | 2015 |
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency K Lee, SG Choi, DH Lee, JH Park, M Yung Advances in Cryptology–ASIACRYPT 2013 8269, 235-254, 2013 | 64 | 2013 |
Comments on “Secure data sharing in cloud computing using revocable-storage identity-based encryption” K Lee IEEE Transactions on Cloud Computing 8 (4), 1299-1300, 2020 | 42 | 2020 |
Sequential aggregate signatures with short public keys: Design, analysis and implementation studies K Lee, DH Lee, M Yung Public-Key Cryptography–PKC 2013, 423-442, 2013 | 39 | 2013 |
Revocable hierarchical identity-based encryption with shorter private keys and update keys K Lee, S Park Designs, Codes and Cryptography 86 (10), 2407-2440, 2018 | 37 | 2018 |
Aggregating CL-signatures revisited: Extended functionality and better efficiency K Lee, DH Lee, M Yung Financial Cryptography and Data Security–FC 2013, 171-188, 2013 | 35 | 2013 |
Patient-controlled attribute-based encryption for secure electronic health records system J Eom, DH Lee, K Lee Journal of Medical Systems 40 (12), 253, 2016 | 31 | 2016 |
Unbounded hierarchical identity-based encryption with efficient revocation G Ryu, K Lee, S Park, DH Lee WISA 2015, 122-133, 2015 | 29 | 2015 |
Self-updatable encryption with short public parameters and its extensions K Lee Designs, Codes and Cryptography 79 (1), 121-161, 2016 | 27 | 2016 |
Visual honey encryption: Application to steganography JW Yoon, H Kim, HJ Jo, H Lee, K Lee ACM Workshop on Information Hiding and Multimedia Security, 65-74, 2015 | 27 | 2015 |
A generic construction for revocable identity-based encryption with subset difference methods K Lee PLoS ONE 15 (9), e0239053, 2020 | 25 | 2020 |
Anonymous HIBE with short ciphertexts: Full security in prime order groups K Lee, JH Park, DH Lee Designs, Codes and Cryptography 74 (2), 395-425, 2015 | 24 | 2015 |
Fully secure hidden vector encryption under standard assumptions JH Park, K Lee, W Susilo, DH Lee Information Sciences 232, 188-207, 2013 | 24 | 2013 |
Improved hidden vector encryption with short ciphertexts and tokens K Lee, DH Lee Designs, Codes and Cryptography 58 (3), 297-319, 2011 | 23 | 2011 |
Two-input functional encryption for inner products from bilinear maps K Lee, DH Lee IEICE Transactions on Fundamentals of Electronics, 915-928, 2018 | 21 | 2018 |
Revocable hierarchical identity-based encryption with adaptive security K Lee Theoretical Computer Science 880, 37-68, 2021 | 20 | 2021 |
Sequential aggregate signatures made shorter K Lee, DH Lee, M Yung Applied Cryptography and Network Security–ACNS 2013, 202-217, 2013 | 20 | 2013 |
Public-key revocation and tracing schemes with subset difference methods revisited K Lee, WK Koo, DH Lee, JH Park European Symposium on Research in Computer Security–ESORICS 2014, 1-18, 2014 | 17 | 2014 |