Dong Hoon LEE


Two-Input Functional Encryption for Inner Products from Bilinear Maps
Kwangsu LEE Dong Hoon LEE 
Publication:   
Publication Date: 2018/06/01
Vol. E101-A  No. 6  pp. 915-928
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
functional encryptionmulti-input functional encryptioninner productbilinear maps
 Summary | Full Text:PDF(644.6KB)

Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Seunghwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/07/01
Vol. E99-D  No. 7  pp. 1933-1936
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
revocable identity-based encryptionkey revocationcloud-based identity-based proxy re-encryptionciphertext update
 Summary | Full Text:PDF(100.4KB)

A Variant of Park-Lee Identity-Based Encryption System
Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/03/01
Vol. E99-A  No. 3  pp. 720-732
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
identity-based encryptionbilinear maps
 Summary | Full Text:PDF(754.5KB)

Practical Effect of the Predictability of Android OpenSSL PRNG
Soo Hyeon KIM Daewan HAN Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8  pp. 1806-1813
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
SSL/TLSandroidOpenSSLPRNGSecureRandom
 Summary | Full Text:PDF(1.7MB)

Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
Jin Ho HAN Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/04/01
Vol. E96-A  No. 4  pp. 796-806
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionconditional access systemcopyright protectionbilinear pairingspersonalized messages
 Summary | Full Text:PDF(924.1KB)

Cryptanalysis of INCrypt32 in HID's iCLASS Systems
ChangKyun KIM Eun-Gu JUNG Dong Hoon LEE Chang-Ho JUNG Daewan HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 35-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
INCrypt32HID's iCLASSRFIDreverse engineeringchosen message attack
 Summary | Full Text:PDF(1.4MB)

Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
Ji Young CHUN Dowon HONG Dong Hoon LEE Ik Rae JEONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12  pp. 2451-2460
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
t-repetitionrare casesset operationdata miningprivacy
 Summary | Full Text:PDF(1MB)

On the Security of Luo et al.'s Fully Secure Hierarchical Identity Based Encryption Scheme
Kwangsu LEE Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1631-1636
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
hierarchical identity based encryptionfull securitybilinear pairing
 Summary | Full Text:PDF(108.4KB)

A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9  pp. 1620-1631
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hidden vector encryptionsearchable public key encryptionbilinear maps
 Summary | Full Text:PDF(320.8KB)

Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1269-1273
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
hierarchical identity-based encryptionfull securitybilinear maps
 Summary | Full Text:PDF(96.7KB)

Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7  pp. 1724-1726
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
hierarchical identity-based encryptionbilinear pairingunbounded delegation
 Summary | Full Text:PDF(70.5KB)

Searchable Encryption with Keyword-Recoverability
Ik Rae JEONG Jeong Ok KWON Dowon HONG Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 1200-1203
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
keyword searchkeyword-testabilitykeyword-recoverabilitydata-recoverabilitychosen ciphertext attacks
 Summary | Full Text:PDF(94.5KB)

Stronger Chikazawa-Yamagishi ID-Based Key Distribution
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5  pp. 1379-1382
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key distributionID-basedforward secrecysession state revealtime synchronization
 Summary | Full Text:PDF(98.5KB)

Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/03/01
Vol. E92-A  No. 3  pp. 932-934
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
non-interactive key sharingidentity-based cryptosystemcollusion attacks
 Summary | Full Text:PDF(64.8KB)

Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
Jong Hwan PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 329-331
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key distributionidentity-based key encapsulationmulti-receiver setting
 Summary | Full Text:PDF(78.5KB)

Analysis of Revocable-iff-Linked Ring Signature Scheme
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 322-325
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
ring signatureanonymitylinkabilityrevocability
 Summary | Full Text:PDF(88KB)

Security Analysis of a Variant of Self-Shrinking Generator
Dong Hoon LEE Je Hong PARK Jae Woo HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1824-1827
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
stream cipherLFSRself-shrinking generatorguess-and-determine attack
 Summary | Full Text:PDF(81.7KB)

ID-Based Authenticated Group Key Agreement Secure against Insider Attacks
Kyu Young CHOI Jung Yeon HWANG Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1828-1830
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticated group key agreementID-based cryptographyinsider attack
 Summary | Full Text:PDF(73.2KB)

Strong ID-Based Key Distribution
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B  No. 1  pp. 306-308
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
key distributionID-basedlong-term keysession statekey independence
 Summary | Full Text:PDF(73.3KB)

On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/11/01
Vol. E90-A  No. 11  pp. 2626-2628
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
ID-based schemeconference keystrong forward secrecy
 Summary | Full Text:PDF(70.9KB)

Three-Round Smart Card-Based Key Exchange Scheme
Jeong Ok KWON Ik Rae JEONG Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11  pp. 3255-3258
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographykey exchangesmart card
 Summary | Full Text:PDF(348.4KB)

On the Security of Status Certificate-Based Encryption Scheme
Je Hong PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 303-304
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
public key encryptionstatus certificate-based encryptioncryptanalysiskey substitution
 Summary | Full Text:PDF(61.8KB)

Quadratic Equations from APN Power Functions
Jung Hee CHEON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 19-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
algebraic attackquadratic equationsalmost perfect nonlinear (APN)linear independencenonlinearity
 Summary | Full Text:PDF(181.6KB)