default search action
Jihye Kim 0001
Person information
- affiliation: Kookmin University, Seoul, South Korea
- affiliation (PhD 2008): University of California, Irvine, CA, USA
Other persons with the same name
- Jihye Kim — disambiguation page
- Jihye Kim 0002 — Samsung Electronics, Hwaseoung, South Korea (and 1 more)
- Jihye Kim 0003 — Seoul National University, Institute of New Media and Communications, Department of Electrical and Computer Engineering, South Korea
- Jihye Kim 0004 — AIGENSciences Inc., Seoul, South Korea (and 1 more)
- Jihye Kim 0005 — North Carolina State University, Bioinformatics Research Center, Raleigh, NC, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Daehyeon Lee, Ohsuk Shin, Yeonghyeon Cha, Junghee Lee, Taisic Yun, Jihye Kim, Hyunok Oh, Chrysostomos Nicopoulos, Sang Su Lee:
A Hardware-Based Correct Execution Environment Supporting Virtual Memory. IEEE Access 12: 114008-114022 (2024) - [j16]Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs. IEEE Trans. Dependable Secur. Comput. 21(4): 4254-4270 (2024) - [c25]Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim:
zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. AsiaCCS 2024 - [c24]Wenyi Tang, Shankha Shubhra Mukherjee, Seongho Park, Changhao Chenli, Hyunok Oh, Jihye Kim, Taeho Jung:
GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain. Blockchain 2024: 113-122 - [i22]Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh:
Hadamard Product Arguments and Their Applications. IACR Cryptol. ePrint Arch. 2024: 981 (2024) - [i21]Seongho Park, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system. IACR Cryptol. ePrint Arch. 2024: 1003 (2024) - [i20]Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, Jihye Kim:
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines. IACR Cryptol. ePrint Arch. 2024: 1405 (2024) - [i19]Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim:
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. IACR Cryptol. ePrint Arch. 2024: 1509 (2024) - [i18]Seungwoo Kim, Semin Han, Seongho Park, Kyeongtae Lee, Jihye Kim, Hyunok Oh:
zkMarket : Privacy-preserving Digital Data Trade System via Blockchain. IACR Cryptol. ePrint Arch. 2024: 1775 (2024) - 2023
- [j15]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts. IEEE Access 11: 56463-56480 (2023) - [c23]Sungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh:
Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS (3) 2023: 348-366 - 2022
- [c22]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. CCS 2022: 455-469 - [i17]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts. IACR Cryptol. ePrint Arch. 2022: 211 (2022) - 2021
- [j14]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs. IEEE Access 9: 97705-97717 (2021) - [c21]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. AsiaCCS 2021: 213-226 - [i16]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2021: 567 (2021) - [i15]Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim:
Privacy-preserving Identity Management System. IACR Cryptol. ePrint Arch. 2021: 1459 (2021) - [i14]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. IACR Cryptol. ePrint Arch. 2021: 1672 (2021) - 2020
- [j13]Jihye Kim, Jiwon Lee, Hyunok Oh:
Simulation-Extractable zk-SNARK With a Single Verification. IEEE Access 8: 156569-156581 (2020) - [j12]Junghee Lee, Chrysostomos Nicopoulos, Gweonho Jeong, Jihye Kim, Hyunok Oh:
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment. IEEE Access 8: 216689-216706 (2020) - [j11]Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption. Sensors 20(11): 3140 (2020) - [i13]Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network. IACR Cryptol. ePrint Arch. 2020: 584 (2020) - [i12]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2020: 1579 (2020)
2010 – 2019
- 2019
- [j10]Jihye Kim, Hyunok Oh:
FAS: Forward secure sequential aggregate signatures for secure logging. Inf. Sci. 471: 115-131 (2019) - [j9]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Gwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. ACM Trans. Embed. Comput. Syst. 18(5s): 62:1-62:17 (2019) - [c20]Thomas Haywood Dadzie, Jiwon Lee, Jihye Kim, Hyunok Oh:
SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper). LCTES 2019: 57-69 - [c19]Jihye Kim, Hankyung Ko, Hyunok Oh:
AILocker: authenticated image locker for video. SAC 2019: 1508-1511 - [c18]Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh:
Forward Secure Identity-Based Signature Scheme with RSA. SEC 2019: 314-327 - [i11]Jihye Kim, Jiwon Lee, Hyunok Oh:
QAP-based Simulation-Extractable SNARK with a Single Verification. IACR Cryptol. ePrint Arch. 2019: 586 (2019) - [i10]Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim:
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2019: 1241 (2019) - [i9]Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization. IACR Cryptol. ePrint Arch. 2019: 1270 (2019) - [i8]Jiwon Lee, Jihye Kim, Hyunok Oh:
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments. IACR Cryptol. ePrint Arch. 2019: 1311 (2019) - [i7]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2019: 1342 (2019) - 2018
- [j8]Hyunok Oh, Jihye Kim, Ji Sun Shin:
Forward-secure ID based digital signature scheme with forward-secure private key generator. Inf. Sci. 454-455: 96-109 (2018) - [c17]Thomas Haywood Dadzie, Jihye Kim, Hyunok Oh:
Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress. CODES+ISSS 2018: 6 - [c16]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. ESORICS (2) 2018: 269-287 - [c15]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial subset difference public key broadcast encryption scheme for secure multicast. SAC 2018: 1593-1600 - [i6]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. IACR Cryptol. ePrint Arch. 2018: 1202 (2018) - 2017
- [c14]Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, Hyunok Oh:
PASS: Privacy aware secure signature scheme for surveillance systems. AVSS 2017: 1-6 - [c13]Jihye Kim, Hyunok Oh:
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers. SEC 2017: 523-537 - [i5]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast. IACR Cryptol. ePrint Arch. 2017: 408 (2017) - 2015
- [c12]Jihye Kim, Wonwoo Yang, Seunghwa Lee, Wonjoon Hwang:
Mediated aggregate signature schemes in wireless sensor networks. SECON Workshops 2015: 7-12 - 2014
- [j7]Hyunok Oh, Jihye Kim:
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory. IEEE Trans. Computers 63(4): 820-832 (2014) - 2012
- [c11]Myungsun Kim, Jihye Kim:
Privacy-preserving web search. ICUFN 2012: 480-481 - [i4]Myungsun Kim, Jihye Kim, Jung Hee Cheon:
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. IACR Cryptol. ePrint Arch. 2012: 243 (2012) - 2011
- [j6]Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:
Threshold signature schemes for ElGamal variants. Comput. Stand. Interfaces 33(4): 432-437 (2011) - [j5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [i3]Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:
Constant-Round Privacy Preserving Multiset Union. IACR Cryptol. ePrint Arch. 2011: 138 (2011) - 2010
- [j4]Emiliano De Cristofaro, Jihye Kim:
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Secur. Priv. 8(4): 18-24 (2010) - [j3]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair threshold decryption with semi-trusted third parties. Int. J. Appl. Cryptogr. 2(2): 139-153 (2010) - [c10]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. ASIACRYPT 2010: 213-231 - [i2]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. IACR Cryptol. ePrint Arch. 2010: 469 (2010)
2000 – 2009
- 2009
- [j2]Jihye Kim, Gene Tsudik:
SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) - [c9]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. ACISP 2009: 309-326 - [c8]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - 2008
- [c7]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c6]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 - [i1]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. IACR Cryptol. ePrint Arch. 2008: 282 (2008) - 2007
- [c5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c4]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - 2006
- [j1]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c3]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - 2005
- [c2]Jihye Kim, Gene Tsudik:
SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 - 2004
- [c1]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint