Name
Affiliation
Papers
SEUNG GEOL CHOI
University of Maryland
34
Collaborators
Citations 
PageRank 
54
734
30.60
Referers 
Referees 
References 
1411
614
639
Search Limit
1001000
Title
Citations
PageRank
Year
Compressed Oblivious Encoding for Homomorphically Encrypted Search00.342021
Differentially-Private Multi-Party Sketching for Large-Scale Statistics.00.342020
Multi Authority Access Control in a Cloud EHR System with MA-ABE10.372019
rORAM - Efficient Range ORAM with O(log2 N) Locality.00.342019
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs.00.342018
A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption.30.372018
Improved, Black-Box, Non-Malleable Encryption from Semantic Security.10.352018
Efficient Range ORAM with 핆(log2N) Locality.00.342018
Deterministic, Stash-Free Write-Only ORAM.20.432017
POPE: Partial Order-Preserving Encoding.00.342016
ObliviSync: Practical Oblivious File Backup and Synchronization.30.382016
Managing Cloud Storage Obliviously.00.342016
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence120.532016
Oblivious Secure Deletion with Bounded History Independence00.342015
Efficient Three-Party Computation from Cut-and-Choose.130.532014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.40.372014
Blind Seer: A Scalable Private DBMS641.942014
Multi-Client Non-Interactive Verifiable Computation.230.722013
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency90.532013
Lossy trapdoor functions from homomorphic reproducible encryption30.422012
On the security of the "Free-XOR" technique301.122012
On the centrality of off-line e-cash to concrete partial information games00.342012
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces301.012012
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens.00.342011
BiTR: built-in tamper resilience3269.942011
Simple, Black-Box Constructions of Adaptively Secure Protocols360.972009
Secure Multi-party Computation Minimizing Online Rounds70.532009
The Kurosawa--Desmedt key encapsulation is not chosen-ciphertext secure171.192009
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols371.112009
Black-box construction of a non-malleable encryption scheme from any semantically secure one331.102008
Reputation Systems for Anonymous Networks481.772008
Fair Traceable Multi-Group Signatures110.522008
Two-party computing with encrypted data120.542007
Short traceable signatures based on bilinear pairings90.492006