Name
Papers
Collaborators
KWANGSU LEE
38
22
Citations 
PageRank 
Referers 
117
20.83
262
Referees 
References 
339
569
Search Limit
100339
Title
Citations
PageRank
Year
Two-Round Multi-Signatures from Okamoto Signatures.00.342022
Improving The Security Of Direct Anonymous Attestation Under Host Corruptions00.342021
Tight security for the generic construction of identity-based signature (in the multi-instance setting).00.342020
Comments on “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption”20.402020
On the Analysis of the Revocable-Storage Identity-Based Encryption Scheme.00.342019
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers00.342019
CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts00.342019
Ciphertext Outdate Attacks on Xu et al.'s Revocable Attribute-Based Encryption Scheme.00.342018
Multi-Client Order-Revealing Encryption.10.362018
Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys.00.342018
Two-Input Functional Encryption For Inner Products From Bilinear Maps20.392018
Efficient Revocable Identity-Based Encryption via Subset Difference Methods.60.442017
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness.00.342017
Efficient Hidden Vector Encryptions and Its Applications.00.342017
Revocable Hierarchical Identity-Based Encryption from Multilinear Maps.00.342016
Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups.00.342016
Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.20.362016
Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups.00.342016
Sequential aggregate signatures with short public keys without random oracles00.342015
Anonymous HIBE with short ciphertexts: full security in prime order groups50.402015
New Constructions of Revocable Identity-Based Encryption from Multilinear Maps210.772015
Identity-Based Revocation From Subset Difference Methods Under Simple Assumptions00.342015
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation.00.342015
New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem00.342015
Self-Updatable Encryption with Short Public Parameters and Its Extensions.30.392014
Security analysis of an identity-based strongly unforgeable signature scheme20.412014
Public-Key Revocation and Tracing Schemes with Subset Difference Methods.10.362013
Sequential aggregate signatures made shorter10.352013
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency90.532013
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.50.402013
Fully secure hidden vector encryption under standard assumptions60.542013
Adaptively secure broadcast encryption under standard assumptions with better efficiency50.412013
On The Security Of Luo Et Al.'S Fully Secure Hierarchical Identity Based Encryption Scheme10.372012
Privacy preserving revocable predicate encryption revisited.10.352012
Improved hidden vector encryption with short ciphertexts and tokens70.432011
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups75.762010
The measurement of the dielectric and optical properties of nano thin films by THz differential time-domain spectroscopy10.512003
New DSA-verifiable signcryption schemes291.142002