Follow
Seung Geol Choi
Seung Geol Choi
Associate Professor, US Naval Academy
Verified email at usna.edu - Homepage
Title
Cited by
Cited by
Year
Blind seer: A scalable private DBMS
V Pappas, F Krell, B Vo, V Kolesnikov, T Malkin, SG Choi, W George, ...
2014 IEEE Symposium on Security and Privacy, 359-374, 2014
3242014
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
1662008
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
SG Choi, KW Hwang, J Katz, T Malkin, D Rubenstein
Cryptographers’ Track at the RSA Conference, 416-432, 2012
1432012
On the security of the “free-XOR” technique
SG Choi, J Katz, R Kumaresan, HS Zhou
Theory of Cryptography Conference, 39-53, 2012
1182012
Multi-client non-interactive verifiable computation
SG Choi, J Katz, R Kumaresan, C Cid
Theory of Cryptography Conference, 499-518, 2013
1172013
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
942016
Improved non-committing encryption with applications to adaptively secure protocols
SG Choi, D Dachman-Soled, T Malkin, H Wee
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
812009
A practical oblivious map data structure with secure deletion and history independence
DS Roche, A Aviv, SG Choi
2016 IEEE Symposium on Security and Privacy (SP), 178-197, 2016
752016
Simple, black-box constructions of adaptively secure protocols
SG Choi, D Dachman-Soled, T Malkin, H Wee
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
712009
Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency
K Lee, SG Choi, DH Lee, JH Park, M Yung
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
69*2013
Black-box construction of a non-malleable encryption scheme from any semantically secure one
SG Choi, D Dachman-Soled, T Malkin, H Wee
Theory of Cryptography Conference, 427-444, 2008
642008
BiTR: Built-in tamper resilience
SG Choi, A Kiayias, T Malkin
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
592011
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
SG Choi, J Katz, H Wee, HS Zhou
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
482013
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
452014
Differentially-private multi-party sketching for large-scale statistics
SG Choi, D Dachman-Soled, M Kulkarni, A Yerukhimovich
Proceedings on Privacy Enhancing Technologies, 153-174, 2020
422020
Short traceable signatures based on bilinear pairings
SG Choi, K Park, M Yung
Advances in Information and Computer Security: First International Workshop …, 2006
382006
Fair traceable multi-group signatures
V Benjumea, SG Choi, J Lopez, M Yung
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
372008
Anonymity 2.0–X. 509 extensions supporting privacy-friendly authentication
V Benjumea, SG Choi, J Lopez, M Yung
Cryptology and Network Security: 6th International Conference, CANS 2007 …, 2007
362007
Two-party computing with encrypted data
SG Choi, A Elbaz, A Juels, T Malkin, M Yung
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
342007
Deterministic, stash-free write-only oram
DS Roche, A Aviv, SG Choi, T Mayberry
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20