Kwangsu Lee
Associate Professor, Department of Computer and Information Security, Sejong University
Research Interest: Cryptography and Computer Security
Email: kwangsu at sejong dot ac dot kr
Tel: +82-2-6935-2454
Office: Daeyang AI Center, 726
Link: DBLP, Google Scholar
Publications
Dynamic Threshold Key Encapsulation with Transparent Setup
by Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, and Hyoseung Kim
ManuscriptAnonymous Revocable Identity-Based Encryption Supporting Anonymous Revocation
by Kwangsu Lee
Manuscript [ pdf ]GCKSign: Simple and Efficient Signatures from Generalized Compact Knapsack Problems
by Joo Woo, Kwangsu Lee, and Jong Hwan Park
PLoS ONE, vol. 19, no. 5, pp. e0310708, Sep. 2024. [ pdf, link ]Two-Round Multi-Signatures from Okamoto Signatures
by Kwangsu Lee and Hyoseung Kim
Mathmatics, vol. 11, no. 14: 3223, July 2023. [ pdf, link ]Delegate and Verify the Update Keys of Revocable Identity-Based Encryption
by Kwangsu Lee
IEEE Access, vol. 11, pp. 52636-52652, May 2023. [ pdf, link ]Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
by Kwangsu Lee
Designs, Codes and Cryptography, vol. 91, no. 3, pp 1053-1093, Mar. 2023 [ pdf, link ]Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries
by Kwangsu Lee
IEEE Access, vol. 10, pp. 62670-62692, Jun. 2022. [ pdf, link ]A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption
by Kwangsu Lee and Joon Sik Kim
IEEE Access, vol. 10, pp. 44178-44199, Apr. 2022. [ pdf, link ]Functional Encryption for Set Intersection in the Multi-Client Setting
by Kwangsu Lee and Minhye Seo
Designs, Codes and Cryptography, vol. 90, no. 1, pp. 17-47, Jan. 2022. [ pdf, link ]Revocable Hierarchical Identity-Based Encryption with Adaptive Security
by Kwangsu Lee
Theoretical Computer Science, vol. 880, pp. 37-68, Aug. 2021. [ pdf, link ]Improving the Security of Direct Anonymous Attestation under Host Corruptions
by Hyoseung Kim, Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
International Journal of Information Security, vol. 20, pp. 475-492, Aug. 2021. [ pdf, link ]Tight Security for the Generic Construction of Identity-Based Signature (in the Multi-Instance Setting)
by Youngkyung Lee, Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Theoretical Computer Science, vol. 847, pp. 122-133, Dec. 2020. [ pdf, link ]Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption"
by Kwangsu Lee
IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1299-1300, Oct. 2020. [ pdf, link ]A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods
by Kwangsu Lee
PLoS ONE, vol. 15, no. 9, pp. e0239053, Sep. 2020. [ pdf, link ]Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme with Time Encodings
by Kwangsu Lee
IEEE Access, vol. 7, pp. 165122-165126, Nov. 2019. [ pdf, link ]Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
by Kwangsu Lee and Jong Hwan Park
IEEE Access, vol. 7, pp. 60333-60347, May 2019. [ pdf, link ]CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
by Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
Computer Journal, vol. 62, no. 4, pp. 545-562, Apr. 2019. [ pdf, link ]Multi-Client Order-Revealing Encryption
by Jieun Eom, Dong Hoon Lee, and Kwangsu Lee
IEEE Access, vol. 6, pp. 45458-45472, Dec. 2018. [ pdf, link ]Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys
by Kwangsu Lee and Seunghwan Park
Designs, Codes and Cryptography, vol. 86, no. 10, pp. 2407-2440, Oct. 2018. [ pdf, link ]Two-Input Functional Encryption for Inner Products from Bilinear Maps
by Kwangsu Lee and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, vol. E101-A, no. 6, pp. 915-928, Jun. 2018. [ pdf, link ]Efficient Revocable Identity-Based Encryption via Subset Difference Methods
by Kwangsu Lee, Dong Hoon Lee, and Jong Hwan Park
Designs, Codes and Cryptography, vol. 85 (1), pp. 39-76, Oct. 2017. [ pdf, link ]Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
by Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
This is the full version of ASIACRYPT 2013 paper
Theoretical Computer Science, vol. 667, pp. 51-92, Mar. 2017. [ pdf, link ]Revocable Hierarchical Identity-Based Encryption from Multilinear Maps
by Seunghwan Park, Dong Hoon Lee, and Kwangsu Lee
Manuscript [ pdf ]Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System
by Jieun Eom, Dong Hoon Lee, and Kwangsu Lee
Journal of Medical Systems, vol. 40, pp. 253, Dec. 2016. [ pdf, link ]Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups
by Kwangsu Lee
In ICISC 2016, Seoul, Korea, Nov. 2016. [ pdf, link ]Self-Updatable Encryption with Short Public Parameters and Its Extensions
by Kwangsu Lee
Designs, Codes and Cryptography, vol. 79(1), pp. 121-161, April 2016. [ pdf, link ]New Chosen-Ciphertext Secure Identity-Based Encryption with Tight Security Reduction to the Bilinear Diffie-Hellman Problem
by Jong Hwan Park, Kwangsu Lee, and Dong Hoon Lee
Information Sciences, vol. 325, pp. 256-270, Dec. 2015. [ pdf, link ]Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
by Geumsook Ryu, Kwangsu Lee, Seunghwan Park, and Dong Hoon Lee
In WISA 2015, Jeju, Korea, Aug. 2015. [ pdf, link ]New Constructions of Revocable Identity-Based Encryption from Multilinear Maps
by Seunghwan Park, Kwangsu Lee, and Dong Hoon Lee
IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1564-1577, Aug. 2015. [ pdf, link ]Visual Honey Encryption: Application to Steganography
by Ji Won Yoon, Hyoungshick Kim, Hyunjoo Jo, Hyelim Lee, and Kwangsu Lee
In ACM IH & MMSEC 2015, Portland, Oregon, USA, June 17-19, 2015. [ pdf, link ]Security Analysis of the Unrestricted Identity-Based Aggregate Signature Scheme
by Kwangsu Lee and Dong Hoon Lee
PLoS ONE, vol. 10, no. 5, pp. e0128081, May 2015. [ pdf, link ]Sequential Aggregate Signatures with Short Public Keys without Random Oracles
by Kwangsu Lee, Dong Hoon Lee, and Moti Yung
This is a merged version of PKC 2013 and ACNS 2013 papers.
Theoretical Computer Science, vol. 579, pp. 100-125, May 2015. [ pdf, link ]Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency
by Kwangsu Lee and Dong Hoon Lee
IET Information Security, vol. 9, no. 3, pp. 149-157, May 2015. [ pdf, link ]Privacy Preserving Revocable Predicate Encryption Revisited
by Kwangsu Lee, Intae Kim, and Seong Oun Hwang
Security and Communication Networks, vol. 8, no. 3, pp. 471-485, Feb. 2015. [ pdf, link ]Anonymous HIBE with Short Ciphertexts: Full Security in Prime Order Groups
by Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
Designs, Codes and Cryptography, vol. 74, no. 2, pp. 395-425, Feb. 2015. [ pdf, link ]Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme
by Kwangsu Lee and Dong Hoon Lee
Information Sciences, vol. 286, pp. 29-34, Dec. 2014. [ pdf, link ]Public-Key Revocation and Tracing Schemes with Subset Difference Methods Revisited
by Kwangsu Lee, Woo Kwon Koo, Dong Hoon Lee, and Jong Hwan Park
In ESORICS 2014, LNCS, vol. 8713, pp. 1-18, Springer, 2014. [ pdf, link ]Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency
by Kwangsu Lee, Seung Geol Choi, Dong Hoon Lee, Jong Hwan Park, and Moti Yung
In ASIACRYPT 2013, LNCS, vol. 8269, pp. 235-254, Springer, 2013. [ pdf, link ]Sequential Aggregate Signatures Made Shorter
by Kwangsu Lee, Dong Hoon Lee, and Moti Yung
In ACNS 2013, LNCS, vol. 7954, pp. 202-217, Springer, 2013. [ pdf, link ]Fully Secure Hidden Vector Encryption under Standard Assumptions
by Jong Hwan Park, Kwangsu Lee, Willy Susilo, and Dong Hoon Lee
Information Sciences, vol. 232, pp. 188-207, May 2013. [ pdf, link ]Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
by Kwangsu Lee, Dong Hoon Lee, and Moti Yung
In FC 2013, LNCS, vol. 7859, pp. 171-188, Springer, 2013. [ pdf, link ]Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
by Kwangsu Lee, Dong Hoon Lee, and Moti Yung
In PKC 2013, LNCS, vol. 7778, pp. 423-442, Springer, 2013. [ pdf, link ]On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
by Kwangsu Lee, Jong Hwan Park, and Dong Hoon Lee
IEICE Transactions on Fundamentals of Electronics, vol. E95-A, no. 9, pp. 1631-1636, Sep. 2012. [ pdf, link ]Improved Hidden Vector Encryption with Short Ciphertexts and Tokens
by Kwangsu Lee and Dong Hoon Lee
Designs, Codes and Cryptography, vol. 58, no. 3, pp. 297-319, Mar. 2011. [ pdf, link ]New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
by Kwangsu Lee and Dong Hoon Lee
KSII Transactions on Internet and Information Systems, vol. 4, no. 5, pp. 972-992, Oct. 2010. [ pdf, link ]Non-interactive Identity-Based DNF Signature Scheme and Its Extensions
by Kwangsu Lee, Jung Yeon Hwang, and Dong Hoon Lee
Bulletin of the Korean Mathematical Society, vol. 46, no. 4, pp. 743-769, Jul. 2009. [ pdf, link ]
In ICISC 2008, LNCS, vol. 5461, pp. 166-183, Springer, 2008. [ pdf, link ]New DSA-Verifiable Signcryption Schemes
by Jun-Bum Shin, Kwangsu Lee, and Kyungah Shim
In ICISC 2002, LNCS, vol. 2587, pp. 35-47, Springer, 2002. [ link ]
Professional Activities
ICISC 2016, Seoul, Korea
ASIACRYPT 2016, Vietnam
ICISC 2015, Seoul, Korea
ACNS 2015, New York, USA
Theses
Efficient Hidden Vector Encryptions and Its Applications
PhD Thesis, Korea University, Feb. 2011. [ pdf, link ]Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness
MS Thesis, KAIST, Feb. 2000. [ pdf, link ]