We are looking for passionate researchers
NTRU+KEM의 이항식 파라미터 제안 및 효율적인 구현
Mira Lee, Seungwoo Lee, Jonghyun Kim, and Jong Hwan Park
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), vol.35, no.1, Feb. 2025.
terSIDH의 성능 분석 및 상수 시간 구현
Taehun Kang, Donghoe Heo, Jeonghwan Lee, Suhri Kim, Seokhie Hong
Journal of the Korea Institute of Information Security & Cryptology(JKIISC), vol.34, no.6, Dec. 2024.
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Seungwoo Lee, Joo Woo, Jonghyun Kim and Jong Hwan Park
IEEE Access, Vol. 13, Dec. 2024
GCKSign: Simple and efficient signatures from generalized compact knapsack problems
Joo Woo, Kwangsu Lee, and Jong Hwan Park
PloS one, vol. 19, no. 9, Sep. 2024. (IF 2.9)
Finding small roots for bivariate polynomials over the ring of integers
Jiseung Kim and Changmin Lee
Advances in Mathematics of Communications, vol. 18, no.3, June 2024. (IF 0.7)
Security Guidelines for Implementing Homomorphic Encryption
Jean-Philippe Bossuat, Rosario Cammarota, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player , Yuriy Polyakov, Luis Antonio Ruiz Lopez, Yongsoo Song, and Donggeon Yhee
IACR Communications in Cryptology, 2024.
Parallelly Running and Privacy-Preserving Agglomerative Hierarchical Clustering in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
IEEE Transactions on Big Data, 2024 (IF 7.5, 상위 5%이내)
Improved Multi-User Security Using the Squared-Ratio Method
Yu Long Chen, Wonseok Choi and Changmin Lee
CRYPTO 2023, Aug. 2023.
A Polynomial Time Algorithm for Breaking NTRU Encryption with Multiple Keys
Jiseung Kim and Changmin Lee
Designs, Codes and Cryptography, vol. 91, no. 8, Aug. 2023. (IF 1.4)
Faster TFHE Bootstrapping with Block Binary Keys
Changmin Lee, Seonhong Min, Jinyeong Seo and Yongsoo Song
ASIA-CCS'23, July, 2023.
KpqC 공모전에 제출된 Fiat-Shamir with aborts 구조의 격자 기반 서명 기법 분석
Ga Hee Hong, Joo Woo, and Jong Hwan Park
Review of KIISC, vol. 33, no. 3, June 2023
KpqC 공모전에 제출된 Hash-and-Sign 구조의 격자 기반 서명 기법 분석
Juon Kim and Jong Hwan Park
Review of KIISC, vol. 33, no. 3, June 2023
NTRU+: Compact Construction of NTRU Using Simple Encoding Method
Jonghyun Kim, and Jong Hwan Park
IEEE Trans. Inf. Forensics Secur., 2023 (IF 6.8, 상위 15%이내)
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK
Duc Anh Luong, and Jong Hwan Park
IEEE Access, 2023 (IF 3.9)
Practical dynamic group signatures without knowledge extractors
Hyoseung Kim, Olivier Sanders, Michel Abdalla, and Jong Hwan Park
Des. Codes Cryptogr., 2023 (IF 1.6)
Cryptanalysis of the FRS obfuscation based on the CLT13 Multilinear Map
Jiseung Kim and Changmin Lee
IET Information Security, vol 16, no. 3, Dec. 2022. (IF 1.4)
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNAR
Duc Anh Luong and Jong Hwan Park
IEEE Access, vol. 10, 2022. (IF 3.9)
Privacy-Preserving Identity Management System on Blockchain Using Zk-SNARK
Duc Anh Luong and Jong Hwan Park
IEEE Access, vol. 11, 2022. (IF 3.9)
Privacy-Preserving Blockchain-Based Healthcare System for IoT Devices Using zk-SNARK
Duc Anh Luong and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
An Efficient Open Vote Network for Multiple Candidates
Sangsoo Seol, Hyoseung Kim, and Jong Hwan Park
IEEE Access, 2022 (IF 3.9)
Parallelly Running and Privacy-Preserving k-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Jeongsu Park, and Dong Hoon Lee
Electronics, 2022 (IF 2.9)
효율적인 LWE 기반 재사용 가능한 퍼지 추출기
Juon Kim, Kwangsu Lee, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2022
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Wonhee Cho, Jiseung Kim and Changmin Lee
IET Information Security, vol 15, no.6, June 2021 (IF 1.3)
Improving the security of direct anonymous attestation under host corruptions
Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
International Journal of Information Security, 2021 (IF 2.427)
Anonymous IBE from PEKS: A Generic Construction
Hyun Sook Rhee, and Dong Hoon Lee
International Conference on Information Security Applications 2021
Practical dynamic group signature with efficient concurrent joins and batch verifications
Hyoseung Kim, Youngkyung Lee, Michel Abdalla, and Jong Hwan Park
Journal of Information Security and Applications, 2021 (IF 4.960)
Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2021 (IF 2.9)
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
Jung Hee Cheon , Wonhee Cho , Minki Hhan , Jiseung Kim and Changmin Lee
Journal of Mathematical Cryptology, vol.14, no.1, Oct. 2020.
An Improved Fuzzy Vector Signature with Reusability
Ilhwan Lim, Minhye Seo, Dong Hoon Lee, and Jong Hwan Park
MDPI Applied Sciences, 2020 (IF 2.9)
Tight security for the generic construction of identity-based signature (in the multi-instance setting)
Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Theoretical Computer Science, 2020 (IF 0.827)
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
Youngkyung Lee, Dong Hoon Lee, and Jong Hwan Park
Des. Codes Cryptogr., 2020 (IF 1.492)
Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials
So Hyun Park, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
IEEE Access, 2020 (IF 3.367)
영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록
Hunki Kim, Jonghyun Kim, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2020
An LLL Algorithm for Module Lattices
Changmin Lee, Alice Pellet-Mary, Damien Stehlé and Alexandre Wallet
ASIACRYPT 2019, Dec. 2019.
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim and Changmin Lee
CRYPTO 2019, Aug. 2019.
Cryptanalysis on the CLT13 Multilinear Map
Jung Hee Cheon, Kyoohyung Han, Changmin Lee and Hansol Ryu
Journal of Cryptology vol.32, 2019.
CCA security for self-updatable encryption: Protecting cloud data when clients read/write ciphertexts
Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, Moti Yung, and Yi Mu
The Computer Journal, 2019 (IF 1.077)
Fuzzy Vector Signature and Its Application to Privacy-Preserving Authentication
Minhye Seo, Jung Yeon Hwang, Dong Hoon Lee, Soohyung Kim, Seung-Hyun Kim, and Jong Hwan Park
IEEE Access, 2019 (IF 3.745)
New Technique for Chosen-Ciphertext Security Based on Non-Interactive Zero-Knowledge
Minhye Seo, Michel Abdalla, Dong Hoon Lee, and Jong Hwan Park
Information Sciences, 2019 (IF 5.910, 상위 5%이내)
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
Minhye Seo, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park
International Journal of Information Security, 2019 (IF 1.494)
영지식 증명을 활용한 프라이버시 보장 신용평가방법
Chul Park, Jonghyun Kim, and Dong Hoon Lee
Journal of the Korea Institute of Information Security & Cryptology, 2019
LWE와 LWR을 이용한 효율적인 다중 비트 암호화 기법
Cho Rong Jang, Minhye Seo, and Jong Hwan Park
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), vol.28 no.6, Dec. 2018.
Construction of a New Biometric-Based Key Derivation Function and Its Application
Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang
Security and Communication Networks, Volume 2018, Article ID 6107912, 2018.12.
암호화된 데이터에 대한 프라이버시를 보존하는 k-means 클러스터링 기법
Yunsong Jeong, Joon Sik Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.28, NO.6, pp. 1401-1414, Dec. 2018
FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data
Jin Hyung Park and Dong Hoon Lee
IACR Transactions on Cryptographic Hardware and Embedded Systems(CHES 2018), Vol. 2018, No. 03, 2018.08.
Privacy Preserving k-Nearest Neighbor for Medical Diagnosis in e-Health Cloud
Jeongsu Park and Dong Hoon Lee
Journal of Healthcare Engineering, Volume 2018, Article ID 4073103, 2018.10.
Multi-Client Order-Revealing Encryption
Jieun Eom, Kwangsu Lee, and Dong Hoon Lee
IEEE Access, Vol. 6, pp. 45458-45472, 2018.08.
Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu Lee and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E101-A, No. 6, pp. 915-928, 2018.06.
사용자 폐기를 지원하는 책임 기관 ID 기반 암호
Suri Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.6, pp. 1281-1293, Dec. 2017
Recipient Revocable Broadcast Encryption with Dealership
Joon Sik Kim, Youngkyung Lee, Jieun Eom and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology Vol.27, NO.6, Dec. 2017
Efficient revocable identity-based encryption via subset difference methods
Kwangsu Lee, Dong Hoon Lee, and Jong Hwan Park
Designs, Codes and Cryptography, Vol. 85, No. 1, pp. 39-76, 2017.10.
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
Theoretical Computer Science, Vol. 667, pp. 51-92, 2017.03.
WBAN 환경에서의 개선된 ID 기반 익명 인증 기법
Minsoo Jeong, Jaehyuk Suk, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol. 21, No. 2 : 322~332 Feb. 2017.
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
Jung Hee Cheon, Jinhyuck Jeong and Changmin Lee
LMS Journal of Computation and Mathematics, vol. 19, no. A, Jan. 2016. (IF 0.65)
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System
Jieun Eom, Dong Hoon Lee, and Kwangsu Lee
Journal of Medical Systems, vol. 40 : 253, pp. 1-16, 2016.12.
효율적인 ID 기반 인증 및 키 교환 프로토콜
Jieun Eom, Minhye Seo, Jong Hwan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, Vol.26, No.6, Dec. 2016
Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Seunghwan Park and Dong Hoon Lee
IEICE TRANSACTIONS on Information and Systems, Vol. E99-D, No.7, pp.1933-1936. 2016.07.
무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계: 안전성 모델 및 설계
김송이, 박승환, 이광수
Journal of the Korea Institute of Information and Communication Engineering, 2016. 06.
Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP
Yonghyun Jung, and Dong hoon Lee
KIPS Tr. Comp. and Comm. Sys., Vol.5, No.10 pp.361~372 pISSN: 2287-5891
An efficient IBE scheme with tight security reduction in the random oracle model
Jong Hwan Park and Dong Hoon Lee
Designs, Codes and Cryptography, Vol. 79, No. 1, pp. 63-85, 2016.04.
A Variant of Park-Lee Identity-Based Encryption System
Jong Hwan Park and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol. 99-A No. 3, pp. 720-732, 2016.03.
Selectively Chosen Ciphertext Security in Threshold Public-key Encryption
Ki tak Kim, Jong Hwan Park, and Dong Hoon Lee
SECURITY AND COMMUNICATION NETWORKS, Vol. 9, No. 3, pp. 189-200, 2016.02.
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem
Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Information Sciences, vol. 325, pp. 256-270, 2015.12.
New constructions of revocable identity-based encryption from multilinear maps
Seunghwan Park, Kwangsu Lee, and Dong Lee
IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, 2015.08.
Practical Effect of the Predictability of Android OpenSSL PRNG
Soo Hyeon KIM, Daewan HAN, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98-A, No. 8, pp. 1806-1813, 2015.08.
An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack
Song Yi Kim, Hyoseung Kim, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-4, 2015.08.
Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation
Young Kyung Lee, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-4, 2015.08.
An Improved Fuzzy Attribute-Based Authentication
Jong Pil Yun, Hyoseung Kim, and Dong Hoon Lee
2015 5th International Conference on IT Convergence and Security (ICITCS 2015), IEEE, pp. 1-5, 2015.08.
Keyword Updatable PEKS
Hyun Sook Rhee and Dong Hoon Lee
International Workshop on Information Security Applications(WISA 2015), Lecture Notes in Computer Science 9503, pp. 96-109, 2015.08.
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, and Dong Hoon Lee
International Workshop on Information Security Applications(WISA 2015), Lecture Notes in Computer Science 9503, pp. 122-133, 2015.08.
전방향 안전성을 만족하며 인증서 기반이 아닌 비대화형 키 교환 프로토콜
Youngkyung Lee, Jieun Eom, Seunghyun Seo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.3, Jun. 2015
Sequential Aggregate Signatures with Short Public Keys without Random Oracles
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
Theoretical Computer Science, Vol. 579, pp. 100-125, 2015.05.
Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
Kwangsu Lee and Dong Hoon Lee
IET Information Security, Vol. 9, No. 3, pp. 149-157, 2015.05.
Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups
Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, 2015.02.
안전하고 효율적인 클라이언트 사이드 중복 제거 기술
Kyungsu Park, Jieun Eom, Jeongsu Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.25, NO.1, Feb. 2015
Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
Kwangsu Lee and Dong Hoon Lee
Information Sciences, vol. 286, pp. 29-34, 2014.12.
Fingerprint-based access control using smart cards in IPTV
Eun-A Jun, Hyun Sook Rhee, Jeom Goo Kim, Seok Won Jung, and Dong Hoon Lee
Multimedia Tools and Applications, Vol. 73, No. 2, pp. 647-661, 2014.11.
서명용 개인키 노출 탐지 기법
Moonchan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.5, Oct. 2014
Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, and Jong Hwan Park
European Symposium on Research in Computer Security(ESORICS 2014), Lecture Notes in Computer Science 8713, pp. 1-18, 2014.09.
An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang, Hyoung Joong Kim, Dong Hoon Lee, and Boyeon Song
Information Sciences, vol. 275, pp. 284-292, 2014.08.
인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store
Youngjin Park, Seonjong Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.1, Feb. 2014
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
In ASIACRYPT 2013, Vol. 8259, pp. 235-254, 2013.12.
복호화 위임을 제공하는 효율적인 브로드캐스트 암호시스템
Su Min Han, Seung Hawn Park, Jong Hwan Park, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING(JBE), Vol. 18, No. 5, September 2013
ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법
Tae Su Kim, Hyoseung Kim, Samuel Woo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.23, NO.4, August 2013
Sequential Aggregate Signatures Made Shorter
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
International Conference on Applied Cryptography and Network Security(ACNS 2013), Lecture Notes in Computer Science 7954, pp. 202-217, 2013.06.
Privacy-preserving disjunctive normal form operations on distributed sets
Ji Young Chun, Dowon Hong, Ik Rae Jeong, and Dong Hoon Lee
Information Sciences, vol. 231, pp. 113-122, 2013.05.
Fully secure hidden vector encryption under standard assumptions
Jong Hwan Park, Kwangsu Lee, Willy Susilo, and Dong Hoon Lee
Information Sciences, Vol 232, pp. 188-207, 2013.05.
Anonymous HIBE: Compact Construction Over Prime-Order Groups
Jong Hwan Park, and Dong Hoon Lee
IEEE Transactions on Information Theory, Vol. 59, No. 4, pp. 2531-2541, 2013.04.
Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
Jin Ho Han, Jong Hwan Park, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. 96-A, No. 4, pp. 796-806, 2013.04.
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
International Conference on Financial Cryptography and Data Security(FC 2013), Lecture Notes in Computer Science 7778, pp. 171-188, 2013.04.
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee, Dong Hoon Lee, and Moti Yung
Public-Key Cryptography(PKC 2013), Lecture Notes in Computer Science 7778, pp. 423-442, 2013.02.
Privacy-preserving Range Set union for rare cases in healthcare data
Ji Young Chun, Dong Hoon Lee, and Ik Rae Jeong
IET Communications, Volume 6, Issue 18, pp. 3288 – 3293, 2012.12.
Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
Ji Young Chun, Dowon Hong, Dong Hoon Lee, and Ik Rae Jeong
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. , Vol.E95-A, No.12, pp. 1631-1636, 2012.12.
Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
Kitak Kim, Hyoseung Kim, Miryoung Kim, Jong Hwan Park, and Dong Hoon Lee
Computer Applications for Database, Education, and Ubiquitous Computing, Communications in Computer and Information Science 352, pp. 99-102, 2012.12.
Improved Information Security Risk Analysis for Implementation
MinHye Seo, Kitak Kim, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 75-78, 2012.12.
Full-ID Secure Dual System Broadcast Encryption with Personalized Messages
Jin Ho Han, Jong Hwan Park, and Dong Hoon Lee
The 4th International Conference on Internet(ICONI 2012), pp. 83-86, 2012.12.
Attribute-Based Encryption for Commercial Content Distribution
Hyoseung Kim, Seunghwan Park, Jong Hwan Park
IT Convergence and Security 2012, Lecture Notes in Electrical Engineering 218, pp. 205-213, 2012.12.
A New CCA-secure Public Key Encryption Scheme from the Linear Assumption
Jong Hwan Park and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.365-368, 2012.12.
A Chosen Ciphertext Secure Ciphertext-Policy Attribute-Based Encryption with Constant Ciphertext Length and Threshold
Kitak Kim, Woo Kwon Koo, Jong Hwan Park, and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.265-269, 2012.12.
Collusion-Resistant Identity-based Proxy Reencryption
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
Information Science and Technology(IST) 2012, pp.288-292, 2012.12.
Generic Construction of Designated Tester Public-Key Encryption with Keyword Search
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee
Information Sciences, Vol.205, pp.93-109, 2012.11.
On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No. 9, pp. 1631-1636, 2012.09.
Identity-Based Ring Signature Schemes for Multiple Domains
JuHee Ki, Jung Yeon Hwang, and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 6, No. 10, pp. 2692-2707, 2012.08.
ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법
Milyoung Kim, Hyoseung Kim, Youngdong Son, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.4, Aug. 2012
Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Beom-Hwan Chang, Dong Hoon Lee, and Jong-in Lim
ETRI Journal, Vol.34, No.2, pp.235-244, 2012.04.
On a security model for a retrieval system over encrypted database
Hyun-A Park, Jin Wook Byun, Jae Hyun Park, and Dong Hoon Lee
2011 7th International Conference on Advanced Information Management and Service (ICIPM), IEEE, pp. 76-82, 2011.12.
Intermediary service program based on encryption or encoding of address and name on mail or parcel delivery service
Minseok Choi, Jeungho Byun, MinKeun Choi, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.439-442, 2011.12.
User’s Password Complexity enhancement on Mobile Using QR code
YouChul Jang, Youhyun Yang, Heewon Myeong, and Dong Hoon Lee,
The 3rd International Conference on Internet(ICONI 2011), pp.7-9, 2011.12.
Proposal of Security Process using Password-based Encryption for Local Storage in HTML5
Heewon Myeong, Youchul Jang, Youhyun Yang, Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.443-446, 2011.12.
Secure Serverless RFID Tag search Protocol
Ji Young Chun, Geontae Noh, Dong Hoon Lee, and Ik Rae Jeong
The 3rd International Conference on Internet(ICONI 2011), pp. 533-537, 2011.12.
Privacy Preserving Keyword Search with Access Control
Geontae Noh, Ji Young Chun, Ik Rae Jeong, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp. 513-517, 2011.12.
Identity-Based Online/Offline Signcryption with Batch Verification
Seunghwan Park, Kitak Kim, Woo Kwon Koo, and Dong Hoon Lee
The 3rd International Conference on Internet(ICONI 2011), pp.539-543, 2011.12.
Fully collusion-resistant trace-and-revoke scheme in prime-order groups
Jong Hwan Park, Hyun Sook Rhee, and Dong Hoon Lee
Journal of Communications and Networks, Vol.13, No.5, pp.428-441, 2011.10.
ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법
Milyoung Kim, Hyoseung Kim, Youngdong Son, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.22, NO.4, Aug. 2012
고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템
Young Min Lee, Woo Kwon Koo, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.5, Oct. 2011
Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
Jong Hwan Park, and Dong Hoon Lee
Designs, Codes and Cryptography, Vol.60, No.3, pp. 255-276, 2011.09.
PKIS: practical keyword index search on cloud datacenter
Hyun-A Park, Jae Hyun Park, and Dong Hoon Lee
EURASIP Journal on Wireless Communications and Networking 2011, pp.1-16, 2011.08.
On a security model of conjunctive keyword search over encrypted relational database
Jin Wook Byun and Dong Hoon Lee
Journal of Systems and Software, Vol.84, Issue.8, pp.1364-1372, 2011.08.
검증 능력이 제한된 검색 가능한 공개키 암호시스템
Ji Eun Eom, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.4, Aug. 2011
스마트카드를 이용한 프록시 재 암호화 기법 기반 콘텐츠 공유 메커니즘에 관한 연구
Seunghwan Park, Woo Kwon Koo, Kitak Kim, Hyeran Mun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.21, NO.3, Jun. 2011
Improved hidden vector encryption with short ciphertexts and tokens
Kwangsu Lee and Dong Hoon Lee
Designs Codes and Cryptography, Vol.58, No.3, pp. 297-319, 2011.05.
A New Provably Secure Certificateless Short Signature Scheme
Kyu Young Choi, Jong Hwan Park, and Dong Hoon Lee
Computers & Mathematics with Applications, Vol. 61, Issue 7, pp. 1760-1768, 2011.04.
Extended Fingerprint-based User Authentication Scheme using Smart Cards in Education IPTV
Eun-A Jun, Jeom Goo Kim, Seok Won Jung, and Dong Hoon Lee
2011 International Conference on Information Science and Applications, IEEE, pp. 1-8, 2011.04.
RFID tag search protocol preserving privacy of mobile reader holders
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
IEICE Electronics Express, Vol. 8, No. 2, pp. 50-56, 2011.01.
Chosen Ciphertext Secure Dynamic Threshold Public-key Encryption
Kitak Kim, Jong Hwan Park, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp.709-713, 2010.12.
Robust Identity-based Proxy Re-encryption
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
The 2nd International Conference on Internet(ICONI 2010), pp. 839-840, 2010.12.
개인건강정보의 2차이용 보호에 관한 국내외 법안 연구
Han Na Park, Boo Geum Jung, Dong Hoon Lee, and Kyo Il Chung
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.6, Dec. 2010
New techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Kwangsu Lee and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 4, No. 5, pp. 968-988, 2010.10.
ID기반 온라인/오프라인 사인크립션(Signcryption) 기법
Seunghwan Park, Kitak Kim, Woo Kwon Koo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.5, Oct. 2010
A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
Jong Hwan Park, and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics Communications and Computer Sciences, Vol. E93-A(9), No. 9, pp. 1620-1631, Sep. 2010.
Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof
Ji-Seon Lee, Jik Hyun Chang, and Dong Hoon Lee
Computers & Electrical Engineering, Vol. 36, No. 5, pp. 948-954, Sep. 2010.
Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
Jong Hwan Park and Dong Hoon Lee
IEICE TRANSACTIONS on Fundamentals of Electronics Communications and Computer Sciences, Vol. E93-A, No. 6, pp. 1269-1273, 2010.06.
Combined Authentication based Multi-Level Access Control in Mobile Application for DailyLifeService
Hyun-A Park, Jong Wook Hong, Jae Hyun Park, Justin Zhan, and Dong Hoon Lee
IEEE Transactions on Mobile Computing, Vol. 9, No. 6, pp. 824-837, 2010.06.
A fingerprint-based user authentication scheme using smart cards in IPTV Environments
Eun-A Jun, Hyun Sook Rhee, Seok Won Jung, and Dong Hoon Lee
2010 International Conference on Information Science and Applications, IEEE, pp. 1-8, 2010.04.
Trapdoor security in a searchable public-key encryption scheme with a designated tester
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee
Journal of Systems and Software, Vol. 83, No. 5, pp. 763-771, Mar. 2010.
온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜
Tae Youn Won, Young Jun Yu, Ji Young Chun, Jin Wook Byun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.20, NO.1, Feb. 2010.
A Forward-Secure E-mail Protocol without Certificated Public Keys
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
Information Sciences, Vol. 179, No. 24, pp. 4227-4231, 2009.12.
Efficient Secret Broadcast in the Broadcasting Networks
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Communications Letters, Vol. 13, No. 12, pp. 1001-1003, 2009.12.
Weaknesses in the Hur-Shin-Yoon Decentralized Group Key Management
Jung Yeon Hwang, Ji Young Chun, and Dong Hoon Lee
Wireless Communications & Mobile Computing, Vol. 9, Issue 12, pp. 1565-1571, 2009.12.
Anti-Cloning Protocol Suitable to EPCglobal Class-1 Generation-2 RFID Systems
Eun Young Choi, Dong Hoon Lee, and Jong-In Lim
Computer Standards & Interfaces, Vol. 31, No. 6, pp. 1124-1130, 2009.11.
Security Vulnerability in a Non-Interactive ID-Based Proxy Re-encryption Scheme
Woo Kwon Koo, Jung Yeon Hwang, and Dong Hoon Lee
Information Processing Letters, Vol. 109, No. 23-24, pp. 1260-1262, 2009.11.
이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.5, Oct. 2009
키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법
Ji Seon Lee, Jik Hyun Chang, and Dong Hoon Lee
The Journal of the Korea Contents Association '09 Vol. 9 No. 10
프라이버시를 보호하는 접근제어가 가능한 키워드 검색 기법
Geon Tae Noh, Ji Young Chun, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.5, Oct. 2009
ID 기반의 그룹 키 교환 기법에 대한 연구 동향
Jae Tak Choi, and Dong Hoon Lee
Review of KIISC, VOL.19, NO.4, Aug. 2009
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
Jong Hwan Park and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.7, pp. 1724-1726, 2009.07.
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, and Dong Hoon Lee, Moti Yung
Information Processing Letters, Vol. 109, No. 16, pp. 897-901, 2009.07.
RFID를 위한 이차잉여 기반의 개선된 상호인증 기법
Hannah Park, Seil Kim, Ji Young Chun, and Dong Hoon Lee
KIISE Transactions on Computing Practices (KTCP), 2009.06
A Note on Leakage-Resilient Authenticated Key Exchange
Ji Young Chun, Jung Yeon Hwang, and Dong Hoon Lee
IEEE Transactions on Wireless Communications, Vol.8, No. 5, pp. 2274-2279, 2009.05.
Searchable Encryption with Keyword-Recoverability
Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
IEICE Transactions on Information and Systems, E92-D, No. 5, pp.1200-1203, 2009.05.
Stronger Chikazawa-Yamagishi ID-Based Key Distribution
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.5, pp. 1379-1382, 2009.05.
다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.2, Apr. 2009
Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.3, pp. 932-934, 2009.03.
Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
Journal of Universal Computer Science, Vol. 15, no. 5, pp. 1042-1064, 2009.03.
Improved Searchable Public Key Encryption with Designated Tester
Hyun Sook Rhee, Jong Hwan Park, Willy Susilo, and Dong Hoon Lee
ASIAN ACM Symposium on Information, Computer and Communications Security(ASIACCS '09), pp. 376-379, 2009.03.
Universal Forgery of the Identity-based Sequential Aggregate Signature Scheme
Jung Yeon Hwang, Dong Hoon Lee, and Moti Yung
ASIAN ACM Symposium on Information, Computer and Communications Security(ASIACCS '09), pp. 157-160, 2009.03.
Constructing PEKS Schemes Secure against Keyword Guessing Attacks Is Possible?
Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
Computer Communications, Vol. 32, no. 2, pp. 394-396, 2009.02.
모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법
Dong Chul Kim, Ji Young Chun, Eun Young Choi, and Dong Hoon Lee
The KIPS Transactions : Part C, pp. 189-198, 2009.02.
공개키 인증서를 사용하지 않는 전방향 안전성을 보장하는 E-mail 프로토콜
Jeong Ok Kwon, Young Ju Koo, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.19, NO.1, Feb. 2009
A Remote User Authentication Scheme Without Using Smart Cards
Hyun Sook Rhee, Jeong Ok Kwon, and Dong Hoon Lee
Computer Standards & Interfaces, Vol. 31, no. 1, pp. 6-13, 2009.01.
Analysis of Revocable-iff-Linked Ring Signature Scheme
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 1, pp. 322-325, 2009.01.
Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
Jong Hwan Park and Dong Hoon Lee
IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. E92-A, no. 1, pp.329-331, 2009.01.
CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법
Woo Kwon Koo, Jung Yeon Hwang, Hyoung-Joong Kim, and Dong Hoon Lee
Journal of the Institute of Electronics and Information Engineers, Vol.46, No.1 Jan. 2009
DNF 정책을 가지는 속성 기반 서명
Kwangsu Lee, Jung Yeon Hwang, Hyoung-Joong Kim, and Dong Hoon Lee
Journal of the Institute of Electronics and Information Engineers, Vol.46, No.1 Jan. 2009
Practical Password-Authenticated Three-Party Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, Vol. 2, No. 6 pp. 312-332, 2008.12.
Non-Interactive Identity-Based DNF Signature and Its Extensions
Kwangsu Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Information Security and Cryptology(ICISC 2008), Lecture Notes in Computer Science 5461, pp. 166-183, 2008.12.
Non-interactive identity-based DNF signature scheme and its extensions
Kwangsu Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Information Security and Cryptology, ICISC 2008, Lecture Notes in Computer Science 5461, pp. 166-183, 2008.12.
수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계
Tae Youn Won, Ji Young Chun, Coon Sik Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.6, Dec. 2008
인증서가 없는 강한 지정된 검증자 서명기법
Young Ju Koo, Ji Young Chen, Kyu Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.6, Dec. 2008
표준 모델에서 안전한 Diffie-Hellman 키 교환 프로토콜
Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee, and Dowon Hong
Journal of Korean Institute of Information Scientists and Engineers, VOL.35, NO.6, Dec. 2008
Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
Seil Kim, Ji Young Chun, and Dong Hoon Lee
TrustCom 2008, IEEE, pp. 2235-2239, 2008.11.
Efficient and Secure Communication between Set-top Box and Smart Card in IPTV Broadcasting
Ji-Seon Lee, Hyun Sook Rhee, and Dong Hoon Lee
2008 The 9th International Conference for Young Computer Scientists, IEEE, pp. 2235-2239, 2008.11.
VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜
Sung Hoon Kim, Bum Han Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008
서로 다른 패스워드를 사용하는 두 사용자를 위한 경량 패스워드 기반 키 교환 프로토콜
Jeong Ok Kwon, Ki Tak Kim, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008
추적이 가능한 스마트카드 사용자 인증 기법
Seil Kim, Ji Young Chun, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.5, Oct. 2008
Security weakness in an authenticated group key agreement protocol in two rounds
Jung Yeon Hwang, Kyu Young Cho, and Dong Hoon Lee
Computer Communications, Vol. 31, Issue. 15, pp. 3719-3724, 2008.09.
Public Key Broadcast Encryption Schemes With Shorter Transmissions
Jong Hwan Park, Hee Jean Kim, Maeng Hee Sung, and Dong Hoon Lee
IEEE Transactions on Broadcasting, Vol. 54, No.3, pp.401-411, 2008.09.
Impersonation Attack on a Strong ID-Based Key Distribution
Jung Yeon Hwang, Jongin Lim, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E91-B, No. 8, 2008.08.
Ring Signature with Weak Linkability and Its Applications
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Transactions on Knowledge and Data Engineering, Vol. 20, No. 8, pp. 1145-1148, 2008.08.
Attribute-Based Access Control using Combined Authentication Technologies
Hyun-A Park, Justin Zhan, and Dong Hoon Lee
2008 IEEE International Conference on Granular Computing, IEEE Computer Society Press, pp. 1-6, 2008.08.
ID-based authenticated group key agreement secure against insider attacks
Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.7, pp.1828-1830, 2008.07.
Identity-Based Universal Designated Multi-Verifiers Signature Schemes
Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, and Dong Hoon Lee
Computer Standards & Interfaces, Vol.30, no.5, pp. 288-295, 2008.07.
Multi-Protocol Authentication for SIP/SS7 Mobile Network
Hyung-Soo Park , Hyung-Woo Lee , Dong Hoon Lee, and Hong-Ki Ko
Computer Communications, Vol 31, no. 11, pp. 2755-2763, 2008.07.
Web Site Credibility Evaluation Framework for Negotiation of Personal Information
Hyun Cheol Kim, Young Ju Goo, Ji Young Chun, Hae Ryong Park, Yeon Jung Kang, and Dong Hoon Lee
The 3rd Joint Workshop on Information Security (JWIS), pp.129-135, 2008.07.
Efficient Keyword Index Search over Encrypted Data of Groups
Hyun-A Park, Justin Zhan, Gary Blosser, and Dong Hoon Lee
2008 IEEE International Conference on Intelligence and Security Informatics, IEEE Computer Society Press, pp. 225-229, 2008.06.
세션상태 정보 노출 공격에 안전한 개선된 그룹 키 교환 프로토콜
Ki Tak Kim, Jeong Ok Kwon, Dowon Hong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.3, Jun. 2008
Anonymous and Traceable Authentication Scheme using Smart Cards
Seil Kim, Hyun Sook Rhee, Ji Young Chun, and Dong Hoon Lee
International Conference on Information Security and Assurance (ISA 2008), pp. 162 -165, 2008.04.
Privacy Preserving SQL Queries
Hyun-A Park, Justin Zhan, and Dong Hoon Lee
The 2nd International Conference on Information Security and Assurance (ISA 2008), pp.549-554, 2008.04.
A New Public Key Broadcast Encryption Using the Boneh-Boyen-Goh's HIBE Scheme
Jong Hwan Park and Dong Hoon Lee
4Th Information Security Practice and Experience Conference (ISPEC `08), Lecture Notes in Computer Science 4991, pp.101-115, 2008.04.
Cryptanalysis and Improvement of a Multi-receiver Identity-Based Key Encapsulation at INDOCRYPT 06
Jong Hwan Park, Ki Tak Kim, and Dong Hoon Lee
ACM Symposium on Information, Computer and Communications Security(ASIACCS'08), pp.373-380, 2008.03.
그룹 사용자간 안전한 콘텐츠 전송을 위한 검증자를 이용한 패스워드 기반 다자간 키 교환 프로토콜
Jeong Ok Kwon, Ik Rae Jeong, Jae Tark Choi, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING, VOL.13, NO.2, pp.251-261, 2008.03.
Parallel Key Exchange
Ik Rae Jeong and Dong Hoon Lee
Journal of Universal Computer Science, Vol.14, No.3, pp. 377-396, 2008.02.
A Survey of Attribute-Based Encryptions
Kwangsu Lee and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), 2008.02.
A Survey of Keyword Search on Encrypted Data
Hyun Sook Rhee, Se-il Kim, and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), pp.49-58, 2008.02.
Three-Party Password-Authenticated Key Exchange under Standard Assumptions
Jeong Ok Kwon, Ik Rae Jeong, Ki Tak Kim, and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), pp.146-155, 2008.02.
A Proxy Multi-Signature scheme
Choi Jae Tark and Dong Hoon Lee
The 3rd International Joint Workshop on Information Security and Applications (IJWISA 2008), 2008.02.
Gen2 기반 RFID 시스템에 적합한 암호 기법 설계
Tae Youn Won, Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.18, NO.1, Feb. 2008
Strong ID-Based Key Distribution
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E91-B, No.1, pp. 306-308, 2008.01.
Certificateless Autenticated Key Agreement for Low-Power Mobile Device
Kyu Young Choi and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.58-60, 2008.01.
Identity-based universal re-encryptions and its extension to the multi-recipient setting
Jin Wook Byun, Bum Han Kim, and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.23-25, 2008.01.
Improved Identification and Key Agreement Protocols
Young Ju Goo, Ki Tak Kim, Jung Yeon Hwang, and Dong Hoon Lee
International Ubiquitous Workshop 2008, pp.26-29, 2008.01.
암호화된 데이터에서의 OT를 이용한 효율적인 검색 기술
Hyun Sook Rhee, Jong Hwan Park, and Dong Hoon Lee
JOURNAL OF BROADCAST ENGINEERING, VOL.13, NO.1, pp. 43-52, 2008.01.
Key Agreement for Key Hypergraph
Ik Rae Jeong and Dong Hoon Lee
Computers & Security, Vol. 26, Issues 7-8, pp. 452-458, 2007.12.
Efficient Oblivious Keyword Search
Hyun Sook Rhee, Hyun Jeong Kim, Jong Hwan Park, and Dong Hoon Lee
The 2nd International Conference on Ubiquitous Information Technologies & Applications, pp. 602~607, 2007.12.
Forward-Secure and Chosen-Ciphertext Secure Public Key Broadcast Encryption
Jong Hwan Park, Seok Koo Yoon, and Dong Hoon Lee
The 2nd International Conference on Ubiquitous Information Technologies & Applications, 631~637, 2007.12.
랜덤 워크 기반의 P2P 익명 프로토콜
Jun Ha Cho, Hyun Sook Rhee, Hyun A Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.6, Dec. 2007
On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing
Ik Rae Jeong, Jeong, Ok Kwon, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No. 11, pp. 2626-2628, 2007.11.
Three-Round Smart Card-Based Key Exchange Scheme
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
IEICE Transactions on Communications, Vol. E90-B, No. 11, pp. 3255-3258, 2007.11.
A Remote User Authenticated Key Agreement Scheme for Multi-server Using Mobile Equipment
Sang Pil Yun, Jun Ho Lee, and Dong Hoon Lee
2007 International Conference on Convergence Information Technology(ICCIT 2007), pp. 337-342, 2007.11.
Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture
Jun Ho Lee and Dong Hoon Lee
International Conference on Convergence Information Technology(ICCIT 2007), pp.687-692, 2007.11.
Attack on Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings
Jae Tark Choi, Jeong Ok Kwon, Seok Koo Yoon, and Dong Hoon Lee
ICUCT' 07, pp. 98-102, 2007.11.
Multi-Party Password-Authenticated Key Exchange with Different Passwords Secure Against Server Compromise
Jeong Ok Kwon, Ik Rae Jeong, Jae Tark Choi, and Dong Hoon Lee
IWUCT' 07, pp. 170-175, 2007.11.
Secure Similarity Search
Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan
International Conference on Granular Computing(GrC 2007), pp.598-604, 2007.11.
EC2C-PAKA: An Efficient Client-to-Client Password-Authenticated Key Agreement
Jin Wook Byun, Dong Hoon Lee, and Jong In Lim
Information Sciences, Elsevier, Vol. 177, No. 19, pp. 3995-4013, 2007.10.
복제 공격 저항성을 갖는 전자봉인 보안 모델
Joo Hae Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.5, Oct. 2007
위 · 변조에 안전한 RFID 지급결제시스템
In Seok Kim, Eun Young Choi, Dong Hoon Lee, Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.5, Oct. 2007
Certificateless Proxy Signature Sheme
Kyu Young Choi and Dong Hoon Lee
The 3rd International Conference on Multimedia Information Technology and its Applications (MITA 2007), pp. 437-440, 2007.08.
Efficient Certificateless Public Key Encryption Secure Against Chosen Plaintext Attacks (Without Random Oracles)
Jong Hwan Park and Dong Hoon Lee
The 3rd International Conference on Multimedia Information Technology and its Applications (MITA 2007), pp. 433-436, 2007.08.
모바일 환경에서의 개인정보 위협 분석 연구
Hyun-A Park, Jae Tark Choi, Jong In Lim, and Dong Hoon Lee
Review of KIISC, VOL.17, NO.4, Aug. 2007
센서 네트워크 내의 위조된 데이터 삽입 공격 방지를 위한 인증 방법
Kwan Tae Cho, Young Ho Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.4, Aug. 2007
모바일 환경에서의 개인정보 위협 분석 연구
Hyun-A Park, Jae Tark Choi, Jong In Lim, and Dong Hoon Lee
JIPS(Journal of Information Processing Systems), VOL.14, NO.5, Aug. 2007
Efficient Verifier-Based Password-Authenticated Key Exchange in the Three-Party Setting
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
Computer Standards & Interfaces, Vol 29, No. 5, pp. 513-520, 2007.07.
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags
Hwaseong Lee, Eun Young Choi, Su-Mi Lee, and Dong Hoon Lee
International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), IEEE CS P2863, pp.73-78. 2007.07.
Secure Mobile RFID system against privacy and security problems
Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU 2007), IEEE CS P2863, 2007.07.
Self-updating : Strong Privacy Protection Protocol for RFID-tagged Banknotes
Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science 4611, pp. 1171-1180, 2007.07.
Certificateless Public Key Encryption in the Selective-ID Security Model(Without Random Oracles)
Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Pairing-based Cryptography (Pairing 2007), Lecture Notes in Computer Science 4575, pp60-82, 2007.07.
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes
Jong Hwan Park and Dong Hoon Lee
European Public Key Infrastructure Workshop (EuroPKI 2007), Lecture Notes in Computer Science 4852, pp. 94-109, 2007.06.
Efficient Certificateless Signature Schemes
Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, and Dong Hoon Lee
5th International Conference on Applied Cryptography and Network Security(ACNS 2007), Lecture Notes in Computer Science 4521, pp. 443-458, 2007.06.
Strong Diffie-Hellman-DSA Key Exchange
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
IEEE Communications letters, Vol. 11, No. 5, pp. 432-433, 2007.05.
PPIDS : Privacy Preserving Intrusion Detection System
Hyun-A Park, Dong Hoon Lee, Jong In Lim, and Sang Hyun Cho
Pacific Asia Workshops on Intelligence and Security Informatics(PAISI 2007), Lecture Notes in Computer Science 4430, pp. 269-274 , 2007.04.
Security Assessment for Application Network Service using Fault Injection
Hyungwoo Kang and Dong Hoon Lee
Pacific Asia Workshops on Intelligence and Security Informatics(PAISI 2007), Lecture Notes in Computer Science 7730, pp. 172-183, 2007.04.
Yang-Yang-Wang의 스마트카드를 이용한 인증 스킴 공격의 오류
Jeong Ok Kwon, Jung Yeon Hwang, and Dong Hoon Lee
The Journal of The Institute of Internet, Broadcasting and Communication, VOL.7, NO.2, pp. 43-47, Apr. 2007
익명성을 제공하는 스마트카드 사용자 인증 프로토콜
Seil Kim, Hyun Sook Rhee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.2, Apr. 2007
Direct Chosen-Ciphertext Secure ID-Based Encryption Schemes in the Selective-ID Security Model
Jong Hwan Park and Dong Hoon Lee
International Workshop on Logistics and Manufacturing Networks, pp. 324-334, 2007.02.
An Efficient Smart Card-Based Key Exchange Scheme
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
International Workshop on Logistics and Manufacturing Networks, pp. 305-315, 2007.02.
Scalable and Fast Object Identification Protocol for RFID Tag System
Joo Hae Kim, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Ubiquitous Information Technologies & Application, pp. 163-172, 2007.02.
모바일 기반의 RFID 프라이버시 보호 기법
Il Jung Kim, Eun Young Choi, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.1, Feb. 2007
무선센서네트워크 환경에서 서명 기반 브로드캐스트 인증
Woo Kwon Koo, Hwaseong Lee, Yong Ho Kim, Jung Yeon Hwang, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.17, NO.1, Feb. 2007
증명 가능한 안전성을 가지는 2라운드 패스워드 기반 그룹 키 교환 프로토콜
Jeong Ok Kwon, Ki Tak Kim, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.7, NO.1, pp. 1-9, Feb. 2007
Oblivious 기반 공통의 키워드 검색 프로토콜 설계
Hyun Sook Rhee, Jin Wook Byun, Hyun A Park, Dong Hoon Lee, and Jong In Lim
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.7, NO.1, pp. 11-20, Feb. 2007
Efficient Group Key Agreement for Dynamic TETRA Networks
Su Mi Lee, Su Youn Lee, and Dong Hoon Lee
SOFSEM 2007, Lecture Notes in Computer Science 4362, pp. 400-409, 2007.01.
An Efficient Password-Based E-mail Protocol for Encrypted E-mail Transmissions on Mobile Equipment
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
The 2007 IEEE International Conference on Consumer Electronics. pp.1-2, 2007.01.
A Diffie-Hellman Key Exchange Protocol without Random Oracles
Ik Rae Jeong, Jeong Ok Kwon, and Dong Hoon Lee
International Conference on Cryptology and Network Security(CANS 2006), Lecture Notes in Computer Science 4301, pp. 37-54, 2006.12.
TETRA 망을 위한 사용자 키 관리 기법
Su Mi Lee, Su Youn Lee, Eun Young Choi, Jong In Lim, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.49-57, Dec. 2006
다수의 수신자를 위한 효율적이고 증명가능한 Universal Re-Encryption
Jin Wook Byun, Jun Ha Cho, and Dong Hoon Lee
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.39-48, Dec. 2006
분산시스템 환경에 적합한 효율적인 RFID 인증 시스템
Eun Young Choi, Su Mi Lee, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.6, Dec. 2006
프라이버시를 보장하는 침입 탐지 시스템의 Audit log
Hyun A Park, Dong Hoon Lee, Jong In Lim, and Sang Hyun Cho
Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), VOL.6, NO.4, pp.59-70, Dec. 2006
Security Analysis and Improvement of a Gateway-oriented Password-based Authenticated Key Exchange Protocol
Jin Wook Byun, Dong Hoon Lee, and Jong In Lim
IEEE Communications Letters, Vol. 10, No. 9, pp. 683-685, 2006.10.
Disaster coverable PKI model utilizing the existing PKI structure
Bo Man Kim, Kyu Young Choi, and Dong Hoon Lee
"On the Move to Meaningful Internet Systems"(OTM 2006), Lecture Notes in Computer Science 4277, pp. 537-545, 2006.10.
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Jeong Ok Kwon, Kouichi Sakurai, and Dong Hoon Lee
IFIP International Conference on Communications and Multimedia Security(CMS 2006), Lecture Notes in Computer Science 4237, pp. 87-96, 2006.10.
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
Jeong Ok Kwon, Ik Rae Jeong, and Dong Hoon Lee
International Workshop on Security(IWSEC 2006), Lecture Notes in Computer Science 4266, pp. 322-336, 2006.10.
Secure EPCglobal Class-1 Gen-2 RFID System against Security and Privacy Problems
Kyoung Hyun Kim, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
OTM Confederated International Conferences, Lecture Notes in Computer Science 4277, pp. 362-371, 2006.10.
Difference Set Attacks on Conjunctive Keyword Search Schemes
Hyun Suk Rhee, Ik Rae Jeong, Jin Wook Byun, and Dong Hoon Lee
Workshop on Secure Data Management(SDM2006), Lecture Notes in Computer Science 4165, pp. 64-74, 2006.09.
Off-line Keyword Guessing Attacks on Recent Keyword Search Schemes Over Encrypted Data
Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, and Dong Hoon Lee
Workshop on Secure Data Management(SDM2006), Lecture Notes in Computer Science 4165, pp. 75-83, 2006.09.
Analysis of an Efficient Group Key Agreement Protocol
Su Mi Lee and Dong Hoon Lee
IEEE Communications Letters, Vol. 10, No. 8, pp. 638-639, 2006.08.
Provably Secure Two-Round Password-Authenticated Group Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, and Dong Hoon Lee
International Workshop on Security (IWSEC), Lecture Notes in Computer Science 4266, pp. 322-326, 2006.08
저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜
Jeong Su Park, Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.4, Aug. 2006
이기종 무선 이동망간 통합 인증 및 키관리 기법
Hyung Soo Park, Hyung Woo Lee, and Dong Hoon Lee
Journal of The Korea Institute of Electronics and Infromation Engineers, VOL.43, NO.7, Jul. 2006
Efficient Conjunctive Keyword Search On Encrypted Data Storage System
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
European Public Key Infrastructure Workshop(EuroPKI 2006), Lecture Notes in Computer Science 4043, pp. 184-196, 2006.06.
A Model for Security Vulnerability Pattern
Hyoung Woo Kang, Kibom Kim, Soon Jwa Hong, and Dong Hoon Lee
International Conference on Computational Science and Its Applications(ICCSA 2006), Lecture Notes in Computer Science 3982, pp. 385-394, 2006.05.
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks
Jeong Ok Kwon, Kouichi Sakurai, and Dong Hoon Lee
International Conference on Computational Science(ICCS 2006), Lecture Notes in Computer Science 3991, pp. 977-980, 2006.05.
Self Re-Encryption Protocol providing strong Privacy for Low Cost RFID system
Jeong Su Park, Su Mi Lee, Eun Young Choi, and Dong Hoon Lee
International Conference on Computational Science and Its Applications(ICCSA 2006), Lecture Notes in Computer Science 3983, pp. 316-325, 2006.05.
Directions in Password-Authenticated Key Exchange
Jeong Ok Kwon, Ik Rae Jeong, Kouchi Sakurai, and Dong Hoon Lee
Communications of the CCISA, 2006.04.
Constant-Round Password-based Group Session-Key Generation for Multi-layer Ad-hoc Networks
Jin Wook Byun, Su Mi Lee, Dong Hoon Lee, and Do-Won Hong
International Conference on Security in Pervasive Computing(SPC 2006), Lecture Notes in Computer Science 3934, pp. 3-17, 2006.04.
1-라운드 양자간 키교환 프로토콜
Ik Rae Jeong, and Dong Hoon Lee
Journal of Korean Institute of Information Scientists and Engineers, VOL.32, NO.1.2, Feb. 2006
비대칭 컴퓨팅 환경을 위한 ID-기반의 인증된 키 동의 프로토콜
Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, and Do Won Hong
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.16, NO.1, Feb. 2006
Efficient and Provably Secure Client-to-Client Password-based Key Exchange Protocol
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
Asia-Pacific Web Conference(APWEB 06), Lecture Notes in Computer Science 3841, pp. 830-836, 2006.01.
Modified ID-based Threshold Decryption and its application to Mediated ID-based Encryption
Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, and Kilsoo Chun
Asia-Pacific Web Conference(APWEB 06), Lecture Notes in Computer Science 3841, pp. 720-725, 2006.01.
Authenticated Public Key Distribution Scheme without Trusted Third Party
Jae Hyung Koo, Bum Han Kim, and Dong Hoon Lee
International Conference on Embedded and Ubiquitous Computing(ECU 2005), Lecture Notes in Computer Science 3823, pp. 926-935, 2005.12.
Efficient RFID Authentication protocol for Ubiquitous Computing Environment
Eun Young Choi, Su Mi Lee, and Dong Hoon Lee
International Conference on Embedded and Ubiquitous Computing(ECU 2005), Lecture Notes in Computer Science 3823, pp. 945-954, 2005.12.
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks
Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
International Conference on Computational and Information Science(CIS 2005), Lecture Notes in Computer Science 3802, pp. 143-148, 2005.12.
Secure Password Pocket for Distributed Web Services
Jae Hyung Koo and Dong Hoon Lee
IFIP International Conference on Network and Parallel Computing(NPC 2005), Lecture Notes in Computer Science 3779, pp. 327 - 334, 2005.12.
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography
Hak Soo Ju, Dae Youb KIM,Dong Hoon Lee
International Conference on Knowledge-Based and Intelligent Information and Engineering Systems(KES 2005), pp.453-459, 2005.10.
저가형 RFID 시스템을 위한 효율적인 인증 프로토콜
Eun Young Choi, Dong Hee Choi, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.15, NO.5, Oct. 2005
인터넷선거 정보보호기술 동향 연구
Jong Uk Hong, Geon Uk Kim, Dong Hoon Lee, and Jong In Lim
Review of KIISC, VOL.15, NO.5, Oct. 2005
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme
Jeong Ok Kwon, Jung Yeon Hwang, Changwook Kim, and Dong Hoon Lee
Applied Mathematics and Computation, Vol. 168, Issue 2, pp. 858-865, 2005.09.
Efficient Member Revocation in Group Signature Schemes
Eun Young Choi, Hyun-Jeong Kim, Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2005), pp. 195-205, 2005.08.
Generic Transformation for Scalable Broadcast Encryption Schemes
Jung Yeon Hwang, Dong Hoon Lee, and JongIn Lim
Annual International Cryptology Conference(CRYPTO 2005), Lecture Notes in Computer Science 3621. pp. 276-292, 2005.08.
Oblivious Conjunctive Keyword Search
Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, and Jongin Lim
International Workshop on Information Security Applications( WISA 2005), Lecture Notes in Computer Science 3786, pp. 318-327, 2005.08.
Secure Index Search for Groups
Hyun-A Park, Jin Wook Byun, and Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2005), Lecture Notes in Computer Science 3592 pp. 128-140, 2005.08.
난수 재사용 기법을 이용한 다중 키 교환 프로토콜
Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Information Processing Society, VOL.12, NO.7, Jul. 2005
Parallel Pairwise Key Agreement Protocols
Ik Rae Jeong, Chang Seop Park, and Dong Hoon Lee
4th International Conference on Advanced Language Processing and Information Technology(ALPIT2005), KIPS, 2005.06.
ID-based Authenticated Key Agreement for Low-Power Mobile Devices
Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, and In Seog Seo
Australasian Conference on Information Security and Privacy(ACISP 2005), Lecture Notes in Computer Science 3574, pp. 494–505, 2005.06.
N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun and Dong Hoon Lee
International Conference on Applied Cryptography and Network Security(ACNS 2005), Lecture Notes in Computer Science 3531 pp. 75-90, 2005.05.
One-Way Chain Based Broadcast Encryption Schemes
Nam-Su Jho, Jung Yeon Hwang, Jung Hee Chun, Myung Hwan Kim, Dong Hoon Lee, and Eun Sun Yoo
Annual International Conference on the Theory and Applications of Cryptographic Techniques(Eurocrypt 2005), pp. 559-574, 2005.05.
Efficient Authentication for Low-Cost RFID systems
Su Mi Lee, Young Ju Hwang, Dong Hoon Lee, and Jong In Lim
International Conference on Computational Science and Its Applications(ICCSA 2005), Lecture Notes in Computer Science 3480, pp. 619-627, 2005.04.
Fine grained control of security capability and forward security in a pairing based signature scheme
Hak Soo Ju, Dae-Youb Kim, Dong Hoon Lee, Jong in Lim, and Kilsoo Chun
International Conference on Computational Science and Its Applications(ICCSA 2005), Lecture Notes in Computer Science 3481, pp. 381-390, 2005.04.
그룹 환경을 위한 안전한 인덱스 검색 스킴
Hyun A Park, Jin Uk Byun, Hyun Suk Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.15, NO.1, Feb. 2005.
프라이버시 보호 기술 및 정책에 관한 연구
Yu Jeong Lee, Jin Uk Byun, and Dong Hoon Lee
Journal of The Korean Institute of Information Scientists and Engineers, VOL.23, NO.1, Jan. 2005.
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Hyun Jeong Kim, Su Mi Lee, and Dong Hoon Lee
International Conference on the Theory and Application of Cryptology and Information Security(Asiacrypt 2004), pp. 245-259, 2004.12.
증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법 : 안전성 모델 및 변환모듈
Hyun Jeong Kim, Su Mi Lee, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.6, Dec. 2004.
익명 통신로에 관한 최근 연구 동향
Hyun Suk Lee, Jin Uk Byun, Hyun A Park, Dong Hoon Lee, and Jong In Lim
Review of KIISC, VOL.14, NO.6, Dec. 2004
SITIS: Scalable Intrusion Tolerance Middleware for Internet Service Survivability
GangShin Lee, Chaetae Im, TaeJin Lee, HyungJong Kim, and Dong Hoon Lee
Pacific-Rim Conference on Multimedia(PCM 2004), Lecture Notes in Computer Science 3331, pp. 564-571, 2004.10.
서비스 현실화에 중점을 둔 인터넷 전자 투표 시스템
Rae Lee, and Dong Hoon Lee
Review of KIISC, VOL.14, NO.5, Oct. 2004.
Efficient Password-Based Group Key Exchange
Su Mi Lee, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Trust, Privacy and Security in Digital Business(TrustBus 2004), Lecture Notes in Computer Science 3184, pp. 191-199, 2004.08.
Matching Connection Pairs
Hyung Woo Kang, Soon Jwa Hong, and Dong Hoon Lee
Parallel and Distributed Computing: Applications and Technologies(PDCAT 2004), Lecture Notes in Computer Science 3320, pp. 642-649, 2004.08.
Scalable key exchange transformation : from two-party to group
Jung Yeon Hwang, Su Mi Lee, and Dong Hoon Lee
Electronics Letters, Vol. 40, No. 12, pp. 728-729, 2004.06.
One-Round Protocols for Two-Party Authenticated Key Exchange
Ik Rae Jeong, Jonathan Katz, and Dong Hoon Lee
International Conference on Applied Cryptography and Network Security(ACNS 2004), Lecture Notes in Computer Science 3089, pp. 220-232, 2004.06.
익명성을 보장하는 비대칭 공개키 공모자 추적 기법
Eun Young Choi, Dong Hoon Lee, and Dowon Hong
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.3, Jun. 2004.
코드 서명 기술의 국내 PKI 적용 방안 비교 연구
Rae Lee, and Dong Hoon Lee
Review of KIISC, VOL.14, NO.3, Jun. 2004.
Efficient ID-based Group Key Agreement with Bilinear Maps
Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Workshop on Public Key Cryptography(PKC 2004), Lecture Notes in Computer Science 2947, pp. 130-144, 2004.03.
그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템
Hak Soo Ju, Dae Youb Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.14, NO.1, Feb. 2004.
Covert Channel Detection in the ICMP Payload Using Support Vector Machine
Taeshik Sohn, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
International Symposium on Computer and Information Sciences(ISCIS 2003), Lecture Notes in Computer Science 2869, pp. 828-835, 2003.10.
An anonymous asymmetric public key traitor tracing scheme
Eun Young Choi, Jung Yeon Hwang, and Dong Hoon Lee
International Conference on Electronic Commerce and Web Technologies(EC-Web 2003), Lecture Notes in Computer Science 2738, pp. 104-114, 2003.09.
Scalable Group Key Management with Minimally Trusted Third Party
Su Mi Lee, Hyun Jeong Kim, Dong Hoon Lee, Jong In Lim, and Chang Seop Park
In 4th International Workshop on Information Security Applications, KIISC, pp. 575-583, 2003.08.
상호인증서를 이용한 국제상호인증 모델 설계
Jae Jung Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.4, Aug. 2003.
Digital Signature Schemes with Restriction on Signing Capability
Jung Yeon Hwang, Dong Hoon Lee, Hyun-Jeong Kim, and JongIn Lim
Australasian Conference on Information Security and Privacy(ACISP 2003), Lecture Notes in Computer Science 2727, pp. 324-335, 2003.06.
공동으로만 Unsigncrypt할 수 있는 Signcryption 기법
Jae Hyung Koo, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.2, Apr. 2003.
다중서버를 이용한 인증된 키교환 프로토콜
Jung Hyun Lee, Hyun Jeong Kim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003.
메시지 복구형 양자 서명 기법
Hwayean Lee, HyungJin Yang, Dong Hoon Lee, Sangjin Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003.
서로 다른 패스워드를 가진 사용자간의 패스워드 인증 키 교환 프로토콜
Jin Wook Byun, Ik Rae Jeong, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.13, NO.1, Feb. 2003.
Password Authenticated Key Exchange between Clients with Different Passwords
Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, and Chang-Seop Park
International Conference on Information and Communications Security(ICICS 2002), Lecture Notes in Computer Science 2513, pp. 134-146, 2002.12.
블라인드 XTR-DSA 스킴을 이용해 블랙메일링을 막는 효율적인 방법
Hye Young Park, Dong Guk Han, Dong Hoon Lee, Sangjin Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002.
서명 능력을 제한하는 전자 서명 스킴
Jung Yeon Hwang, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002.
일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH
Joung Ok Kwon, Jung Yeon Hwang, Hyun Jeong Kim, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.6, Dec. 2002.
An anonymous buyer seller watermarking protocol with anonymity control
Hak Soo Ju, Hyun Jeong Kim, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 421-432, 2002.11.
Efficient Multicast Key Management for Stateless Receivers
Ju Hee Ki, Hyun Jeong Kim, Dong Hoon Lee, and Chang Seop Park
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 497-509, 2002.11.
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security and Cryptology(ICISC 2002), Lecture Notes in Computer Science 2587, pp. 16-34, 2002.11.(online. 2003.03.)
대학교를 대상으로 한 위협에 따른 손실의 수치화
Hyun Sook Rhee, Jin Wook Byun, Ju Hee Ki, Dong Hoon Lee, Jong In Lim, Young Woo park, Jae Suk Yun
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.4, Aug. 2002
Single machine MAD/Tmax problem with common due date
Sung A Cho, Chae-Bogk Kim, and Dong Hoon Lee
COMPUTERS & OPERATIONS RESEARCH, Vol.29 No.8, pp.1099-1113, 2002.07.
Privacy Against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
Hyun Jeong Kim, Dong Hoon Lee, and Moti Yung
Australasian Conference on Information Security and Privacy(ACISP 2002), Lecture Notes in Computer Science 2384, pp. 482-496, 2002.06.
A Practical Approach Defeating Blackmailing
Dong-Guk Han, Hye-Young Park, Yong-Ho Park, Sangjin Lee, Dong Hoon Lee, and Hyung-Jing Yang
Australasian Conference on Information Security and Privacy(ACISP 2002), Lecture Notes in Computer Science 2384, pp. 464-481, 2002.06.
FORTEZZA 카드의 사용자관리를 위한 보안정책
Hun No Lee, Su Mi Lee, Jung Hyun Lee, Yong Soo Kim, Tae Joo Jang, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.12, NO.1, Feb. 2002.
그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.6, Dec. 2001.
Efficient Transferable Cash with Group Signatures
Ik Rae Jeong, Dong Hoon Lee, and Jong In Lim
International Conference on Information Security(ISC 2001), Lecture Notes in Computer Science 2200. pp. 462-474, 2001.11.
Jointly Unsigncryptable Signcryption
Jae Hyung Koo, Hyun Jeong Kim, Ik Rae jeong, Dong Hoon Lee, and Jong In Lim
WISA2001 Vol 13, No. 2, pp. 397-407, 2001.11.
Signcrpytion Schemes with Forward Secrecy
Hee Yun Jung, Dong Hoon Lee, Jong In Lim, and Kisik Chang
WISA2001 Vol. 2, pp. 463-475, 2001.11.
Secure and Efficient Key management for Dynamic Multicast Groups
Chang-Seop Park, and Dong Hoon Lee
ACM SIGOPS Operating Systems Review, Vol. 35, No. 4, pp.32-38, 2001.10.
무제한 사용자 탈퇴를 제공하는 효율적인 공모자 추적 기법
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.5, Oct. 2001
Forward Secrecy를 제공하는 Signcryption 기법들
Hee Yun Jung, Dong Hoon Lee, and Jong In Lim
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.5, Oct. 2001
Efficient and secure member deletion in group signature schemes
Hyun Jeong Kim, Jong In Lim, and Dong Hoon Lee
International Conference on Information Security and Cryptology(ICISC 2000), Lecture Notes in Computer Science 2015, pp. 150-161, 2001.03.
키 복구 기능을 가지는 키 공유 프로토콜의 안전성에 관한 연구
Dae Ho Kim, Sang Woo Park, and Dong Hoon Lee
Journal of The Korea Institute of Information Security & Cryptology(JKIISC), VOL.11, NO.3, Jun. 2001.
Anonymity control in Multi-bank E-cash system
Ik Rae Jeong and Dong Hoon Lee
International Conference on Cryptology in India(INDOCRYPT 2000), Lecture Notes in Computer Science 1977, pp. 104-112, Dec. 2000.
Witness Hiding Protocol
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.12, NO.1, Feb. 2000.
상호 증명 시스템
Dong Hoon Lee
한국정보과학회 컴퓨터이론연구회지, VOL.11, NO.1, Feb. 2000.
IMT-2000 인증 프로토콜 설계
Hyung Woo Kang, E Joong Yoon, Su Yoon Lee, Chang Seop Park, and Dong Hoon Lee
Journal of the Korea Information Processing Society, VOL.6, NO.8, pp. 2133-2144, 1999.