Follow
Jihye Kim
Jihye Kim
Verified email at kookmin.ac.kr
Title
Cited by
Cited by
Year
Linear-complexity private set intersection protocols secure in malicious model
E De Cristofaro, J Kim, G Tsudik
International Conference on the Theory and Application of Cryptology and …, 2010
2802010
SRDP: Secure route discovery for dynamic source routing in MANETs
J Kim, G Tsudik
Ad Hoc Networks 7 (6), 1097-1109, 2009
642009
Privacy-preserving policy-based information transfer
E De Cristofaro, S Jarecki, J Kim, G Tsudik
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
642009
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
S Jarecki, J Kim, G Tsudik
Topics in Cryptology–CT-RSA 2008: The Cryptographers’ Track at the RSA …, 2008
612008
Srdp: Securing route discovery in dsr
J Kim, G Tsudik
The Second Annual International Conference on Mobile and Ubiquitous Systems …, 2005
542005
Flexible robust group key agreement
S Jarecki, J Kim, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 22 (5), 879-886, 2010
452010
Group secret handshakes or affiliation-hiding authenticated group key agreement
S Jarecki, J Kim, G Tsudik
Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006
422006
Authentication for paranoids: Multi-party secret handshakes
S Jarecki, J Kim, G Tsudik
Applied Cryptography and Network Security: 4th International Conference …, 2006
372006
Constant-round privacy preserving multiset union
J Hong, JW Kim, J Kim, K Park, JH Cheon
Cryptology ePrint Archive, 2011
322011
Secure acknowledgment aggregation and multisignatures with limited robustness
C Castelluccia, S Jarecki, J Kim, G Tsudik
Computer Networks 50 (10), 1639-1652, 2006
222006
Robust group key agreement using short broadcasts
S Jarecki, J Kim, G Tsudik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
212007
Sims: Self sovereign identity management system with preserving privacy in blockchain
J Lee, J Hwang, J Choi, H Oh, J Kim
Cryptology ePrint Archive, 2019
182019
Threshold signature schemes for ElGamal variants
S Kim, J Kim, JH Cheon, S Ju
Computer Standards & Interfaces 33 (4), 432-437, 2011
172011
Simulation-extractable zk-SNARK with a single verification
J Kim, J Lee, H Oh
IEEE Access 8, 156569-156581, 2020
162020
FAS: Forward secure sequential aggregate signatures for secure logging
J Kim, H Oh
Information Sciences 471, 115-131, 2019
142019
A robust multisignature scheme with applications to acknowledgement aggregation
C Castelluccia, S Jarecki, J Kim, G Tsudik
Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005
142005
Forward-secure ID based digital signature scheme with forward-secure private key generator
H Oh, J Kim, JS Shin
Information Sciences 454, 96-109, 2018
122018
Scalable wildcarded identity-based encryption
J Kim, S Lee, J Lee, H Oh
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
102018
Compress multiple ciphertexts using ElGamal encryption schemes
M Kim, J Kim, JH Cheon
Cryptology ePrint Archive, 2012
102012
Survival in the wild: Robust group key agreement in wide-area networks
J Kim, G Tsudik
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
102009
The system can't perform the operation now. Try again later.
Articles 1–20