default search action
Goichiro Hanaoka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j93]Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka:
REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory. IEEE Access 12: 47359-47372 (2024) - [j92]Rikuhiro Kojima, Jacob C. N. Schuldt, Goichiro Hanaoka:
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 193-202 (2024) - [j91]Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(4): 619-633 (2024) - [j90]Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(7): 966-988 (2024) - [j89]Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On private information retrieval supporting range queries. Int. J. Inf. Sec. 23(1): 629-647 (2024) - [c173]Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Yoshihiro Koseki, Takahiro Matsuda, Yutaro Nishida, Yusuke Sakai, Jacob C. N. Schuldt, Satoshi Yasuda:
Privacy-Preserving Verifiable CNNs. ACNS (2) 2024: 373-402 - [c172]Ryuya Hayashi, Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono, Goichiro Hanaoka:
Multi-query Verifiable PIR and Its Application. CANS (2) 2024: 166-190 - [c171]Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. TCC (3) 2024: 124-155 - [i53]Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. IACR Cryptol. ePrint Arch. 2024: 1481 (2024) - [i52]Yuuki Fujita, Yusuke Sakai, Kyosuke Yamashita, Goichiro Hanaoka:
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures. IACR Cryptol. ePrint Arch. 2024: 1728 (2024) - 2023
- [j88]Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Takahiro Matsuda, Jacob C. N. Schuldt:
Maliciously circuit-private multi-key FHE and MPC based on LWE. Des. Codes Cryptogr. 91(5): 1645-1684 (2023) - [j87]Kyosuke Yamashita, Ryu Ishii, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(9): 1177-1188 (2023) - [c170]Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Signature for Objects: Formalizing How to Authenticate Physical Data and More. FC (1) 2023: 182-199 - [c169]Nuttapong Attrapadung, Goichiro Hanaoka, Haochen M. Kotoi-Xie, Takahiro Matsuda, Takumi Moriyama, Takao Murakami, Hidenori Nakamura, Jacob C. N. Schuldt, Masaaki Tokuyama, Jing Zhang:
Two-Dimensional Dynamic Fusion for Continuous Authentication. IJCB 2023: 1-9 - [i51]Nuttapong Attrapadung, Goichiro Hanaoka, Haochen M. Kotoi-Xie, Takahiro Matsuda, Takumi Moriyama, Takao Murakami, Hidenori Nakamura, Jacob C. N. Schuldt, Masaaki Tokuyama, Jing Zhang:
Two-Dimensional Dynamic Fusion for Continuous Authentication. CoRR abs/2309.04128 (2023) - [i50]Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters. IACR Cryptol. ePrint Arch. 2023: 155 (2023) - 2022
- [j86]Keisuke Hara, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Generic transformation from broadcast encryption to round-optimal deniable ring authentication. Des. Codes Cryptogr. 90(2): 277-316 (2022) - [j85]Yuji Hashimoto, Koji Nuida, Goichiro Hanaoka:
Tight Security of Twin-DH Hashed ElGamal KEM in Multi-User Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 173-181 (2022) - [j84]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
How to Extend CTRT for AES-256 and AES-192. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(8): 1121-1133 (2022) - [j83]Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures. IEICE Trans. Inf. Syst. 105-D(11): 1845-1856 (2022) - [c168]Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality. ADIoT 2022: 51-71 - [e6]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13177, Springer 2022, ISBN 978-3-030-97120-5 [contents] - [e5]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13178, Springer 2022, ISBN 978-3-030-97130-4 [contents] - 2021
- [j82]Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 89-103 (2021) - [j81]Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1188-1205 (2021) - [c167]Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures. ACNS Workshops 2021: 378-396 - [c166]Nuttapong Attrapadung, Goichiro Hanaoka, Takahiro Matsuda, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Tadanori Teruya, Kazunari Tozawa:
Oblivious Linear Group Actions and Applications. CCS 2021: 630-650 - [c165]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. Public Key Cryptography (1) 2021: 389-420 - [i49]Ai Kitagawa, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Fully Anonymous Group Signature with Verifier-Local Revocation. IACR Cryptol. ePrint Arch. 2021: 170 (2021) - 2020
- [j80]Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka:
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 21-32 (2020) - [j79]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 107-113 (2020) - [j78]Goichiro Hanaoka, Yusuke Sakai, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin:
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 150-164 (2020) - [j77]Yusuke Sakai, Goichiro Hanaoka:
Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 165-172 (2020) - [j76]Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka:
Verifiable Privacy-Preserving Data Aggregation Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 183-194 (2020) - [j75]Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1367-1380 (2020) - [j74]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [j73]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic hardness of inversion on ring and its relation to self-bilinear map. Theor. Comput. Sci. 820: 60-84 (2020) - [c164]Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai, Shota Yamada:
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition. ESORICS (2) 2020: 65-85 - [c163]Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura:
On Private Information Retrieval Supporting Range Queries. ESORICS (2) 2020: 674-694 - [c162]Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, Kazuo Ohta:
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers. ProvSec 2020: 65-84 - [i48]Goichiro Hanaoka, Kazuo Ohta, Yusuke Sakai, Bagus Santoso, Kaoru Takemure, Yunlei Zhao:
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin. IACR Cryptol. ePrint Arch. 2020: 1484 (2020)
2010 – 2019
- 2019
- [j72]Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
MOBIUS: Model-Oblivious Binarized Neural Networks. IEEE Access 7: 139021-139034 (2019) - [j71]Yutaka Kawai, Takahiro Matsuda, Takato Hirano, Yoshihiro Koseki, Goichiro Hanaoka:
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 81-98 (2019) - [j70]Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1048-1060 (2019) - [j69]Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai:
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1101-1117 (2019) - [j68]Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:
A New Combiner for Key Encapsulation Mechanisms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1668-1675 (2019) - [j67]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. Int. J. Inf. Sec. 18(5): 581-617 (2019) - [j66]Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai:
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. Secur. Commun. Networks 2019: 4872403:1-4872403:36 (2019) - [j65]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Theor. Comput. Sci. 795: 570-597 (2019) - [c161]Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. AsiaCCS 2019: 515-528 - [c160]Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions. IWSEC 2019: 253-272 - [c159]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. Public Key Cryptography (1) 2019: 549-580 - [c158]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
An Extended CTRT for AES-256. WISA 2019: 79-91 - [i47]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. IACR Cryptol. ePrint Arch. 2019: 50 (2019) - [i46]Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. IACR Cryptol. ePrint Arch. 2019: 284 (2019) - 2018
- [j64]Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. Des. Codes Cryptogr. 86(8): 1623-1683 (2018) - [j63]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1440-1455 (2018) - [j62]Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1456-1472 (2018) - [j61]Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
More Constructions of Re-Splittable Threshold Public Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1473-1483 (2018) - [j60]Yuji Hashimoto, Koji Nuida, Kazumasa Shinagawa, Masaki Inamura, Goichiro Hanaoka:
Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1503-1511 (2018) - [j59]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1512-1524 (2018) - [j58]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [j57]Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka:
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening. IEICE Trans. Inf. Syst. 101-D(11): 2677-2687 (2018) - [j56]Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Practical attribute-based signature schemes for circuits from bilinear map. IET Inf. Secur. 12(3): 184-193 (2018) - [c157]Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. ASIACRYPT (2) 2018: 493-522 - [c156]Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, Tadanori Teruya:
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. AsiaCCS 2018: 685-697 - [c155]Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka:
Constant-Round Client-Aided Secure Comparison Protocol. ESORICS (2) 2018: 395-415 - [c154]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. EUROCRYPT (1) 2018: 61-90 - [c153]Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka:
On the Security of Linear Sketch Schemes against Recovering Attacks. ICETE (2) 2018: 242-253 - [c152]Ai Ishida, Yusuke Sakai, Goichiro Hanaoka:
A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO. ISITA 2018: 85-89 - [c151]Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka:
Tree-based Secure Comparison of Secret Shared Data. ISITA 2018: 525-529 - [c150]Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai:
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests. ISITA 2018: 530-534 - [c149]Satsuya Ohata, Hiraku Morita, Goichiro Hanaoka:
Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol. ISITA 2018: 535-539 - [c148]Yusuke Sakai, Goichiro Hanaoka:
A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening. ISITA 2018: 703-706 - [c147]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. ISITA 2018: 707-711 - [c146]Ryo Kato, Naohisa Nishida, Ryo Hirano, Tatsumi Oba, Yuji Unagami, Shota Yamada, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Embedding Lemmas for Functional Encryption. ISITA 2018: 712-716 - [c145]Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka:
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. Public Key Cryptography (1) 2018: 437-460 - [c144]Nuttapong Attrapadung, Goichiro Hanaoka, Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Jacob C. N. Schuldt:
Token-Based Multi-input Functional Encryption. ProvSec 2018: 147-164 - [c143]Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka:
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols. ProvSec 2018: 415-422 - [c142]Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Fully Anonymous Group Signature with Verifier-Local Revocation. SCN 2018: 23-42 - [c141]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. SCN 2018: 140-159 - [i45]Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
MOBIUS: Model-Oblivious Binarized Neural Networks. CoRR abs/1811.12028 (2018) - [i44]Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka:
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. IACR Cryptol. ePrint Arch. 2018: 44 (2018) - [i43]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. IACR Cryptol. ePrint Arch. 2018: 155 (2018) - [i42]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map. IACR Cryptol. ePrint Arch. 2018: 463 (2018) - [i41]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. IACR Cryptol. ePrint Arch. 2018: 564 (2018) - [i40]Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 842 (2018) - [i39]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. IACR Cryptol. ePrint Arch. 2018: 1091 (2018) - 2017
- [j55]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. Algorithmica 79(4): 1286-1317 (2017) - [j54]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 34-49 (2017) - [j53]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 73-90 (2017) - [j52]Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1825-1837 (2017) - [j51]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1846-1856 (2017) - [j50]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1882-1890 (2017) - [j49]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Card-Based Protocols Using Regular Polygon Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1900-1909 (2017) - [j48]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Non-Interactive Key Exchange against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1910-1923 (2017) - [j47]Goichiro Hanaoka, Jacob C. N. Schuldt:
Signatures from Trapdoor Commitments with Strong Openings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1924-1931 (2017) - [j46]Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Private Similarity Searchable Encryption for Euclidean Distance. IEICE Trans. Inf. Syst. 100-D(10): 2319-2326 (2017) - [j45]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [j44]Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. Int. J. Appl. Cryptogr. 3(4): 394-406 (2017) - [j43]Kazuki Yoneyama, Goichiro Hanaoka:
Compact public key encryption without full random oracles. Pervasive Mob. Comput. 41: 286-299 (2017) - [c140]Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption. ESORICS (2) 2017: 532-551 - [c139]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. ICITS 2017: 135-152 - [c138]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - [c137]Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. PST 2017: 215-224 - [c136]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka:
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations. SAC 2017: 215-234 - [c135]Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka:
Key Management for Versatile Pay-TV Services. STM 2017: 3-18 - [p2]Goichiro Hanaoka, Shota Yamada:
A Survey on Identity-Based Encryption from Lattices. CREST Crypto-Math Project 2017: 349-365 - [i38]Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka:
Secure Grouping Protocol Using a Deck of Cards. CoRR abs/1709.07785 (2017) - [i37]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature Schemes with a Fuzzy Private Key. IACR Cryptol. ePrint Arch. 2017: 1188 (2017) - [i36]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu:
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus). IACR Cryptol. ePrint Arch. 2017: 1241 (2017) - 2016
- [j42]Goichiro Hanaoka, Jacob C. N. Schuldt:
Convertible Nominative Signatures from Standard Assumptions without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1107-1121 (2016) - [j41]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Computation Protocols Using Polarizing Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1122-1131 (2016) - [j40]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-specific encryption from forward-secure encryption: generic and direct constructions. Int. J. Inf. Sec. 15(5): 549-571 (2016) - [j39]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. J. Inf. Process. 24(2): 275-291 (2016) - [j38]Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro:
A limitation on security evaluation of cryptographic primitives with fixed keys. Secur. Commun. Networks 9(12): 1663-1675 (2016) - [j37]Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda, Takashi Yamakawa:
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models. Secur. Commun. Networks 9(12): 1676-1697 (2016) - [j36]Yusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta:
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. Theor. Comput. Sci. 630: 95-116 (2016) - [c134]Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro:
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information. ACISP (2) 2016: 269-284 - [c133]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Fuzzy Signatures: Relaxing Requirements and a New Construction. ACNS 2016: 97-116 - [c132]Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada:
Attribute Based Encryption with Direct Efficiency Tradeoff. ACNS 2016: 249-266 - [c131]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. ASIACRYPT (2) 2016: 465-495 - [c130]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Size-Hiding Computation for Multiple Parties. ASIACRYPT (2) 2016: 937-966 - [c129]Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. CANS 2016: 228-244 - [c128]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. CRYPTO (2) 2016: 3-32 - [c127]Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. ICITS 2016: 213-237 - [c126]Goichiro Hanaoka, Jacob C. N. Schuldt:
Signatures from trapdoor commitments with strong openings. ISITA 2016: 81-85 - [c125]Goichiro Hanaoka, Jacob C. N. Schuldt:
On signatures with tight security in the multi-user setting. ISITA 2016: 91-95 - [c124]Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka:
Tag-KEM/DEM framework for public-key encryption with non-interactive opening. ISITA 2016: 231-235 - [c123]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Committed AND protocol using three cards with more handy shuffle. ISITA 2016: 700-702 - [c122]Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Private similarity searchable encryption for Euclidean distance. ISITA 2016: 718-722 - [c121]Goichiro Hanaoka:
Towards User-Friendly Cryptography. Mycrypt 2016: 481-484 - [c120]Takahiro Matsuda, Goichiro Hanaoka:
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. Public Key Cryptography (1) 2016: 3-34 - [c119]Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. Public Key Cryptography (1) 2016: 99-129 - [c118]Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Circuits from Bilinear Map. Public Key Cryptography (1) 2016: 283-300 - [c117]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. SCN 2016: 42-61 - [c116]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Signatures Resilient to Uninvertible Leakage. SCN 2016: 372-390 - [e4]Keita Emura, Goichiro Hanaoka, Rui Zhang:
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016. ACM 2016, ISBN 978-1-4503-4286-5 [contents] - [i35]Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. IACR Cryptol. ePrint Arch. 2016: 64 (2016) - [i34]Takahiro Matsuda, Goichiro Hanaoka:
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. IACR Cryptol. ePrint Arch. 2016: 235 (2016) - [i33]Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Circuits from Bilinear Map. IACR Cryptol. ePrint Arch. 2016: 242 (2016) - [i32]Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. IACR Cryptol. ePrint Arch. 2016: 243 (2016) - [i31]Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai:
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. IACR Cryptol. ePrint Arch. 2016: 477 (2016) - [i30]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. IACR Cryptol. ePrint Arch. 2016: 567 (2016) - [i29]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. IACR Cryptol. ePrint Arch. 2016: 877 (2016) - 2015
- [j35]Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai:
Privacy-preserving search for chemical compound databases. BMC Bioinform. 16(S18): S6 (2015) - [j34]Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
Revocable Group Signature with Constant-Size Revocation List. Comput. J. 58(10): 2698-2715 (2015) - [j33]Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka:
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions. Comput. J. 58(10): 2738-2746 (2015) - [j32]Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Disavowable Public Key Encryption with Non-Interactive Opening. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2446-2455 (2015) - [j31]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c115]Yusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta:
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. ACISP 2015: 77-92 - [c114]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
A Signature Scheme with a Fuzzy Private Key. ACNS 2015: 105-126 - [c113]Takahiro Matsuda, Goichiro Hanaoka:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. ASIACRYPT (1) 2015: 415-442 - [c112]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. ASIACRYPT (1) 2015: 521-549 - [c111]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs. ASIACRYPT (1) 2015: 575-601 - [c110]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - [c109]Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Disavowable Public Key Encryption with Non-interactive Opening. AsiaCCS 2015: 667 - [c108]Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption. CT-RSA 2015: 201-219 - [c107]Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption. CT-RSA 2015: 410-428 - [c106]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. ICISC 2015: 20-35 - [c105]Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka:
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data. IWSEC 2015: 242-261 - [c104]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. IWSEC 2015: 281-297 - [c103]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ProvSec 2015: 127-146 - [c102]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [c101]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - [c100]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Content and Key Management to Trace Traitors in Broadcasting Services. STM 2015: 236-252 - [c99]Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. TCC (1) 2015: 561-590 - [i28]Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. IACR Cryptol. ePrint Arch. 2015: 43 (2015) - [i27]Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2015: 112 (2015) - [i26]Takahiro Matsuda, Goichiro Hanaoka:
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2015: 118 (2015) - [i25]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. IACR Cryptol. ePrint Arch. 2015: 128 (2015) - [i24]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:
Conversions among Several Classes of Predicate Encryption and Their Applications. IACR Cryptol. ePrint Arch. 2015: 431 (2015) - [i23]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. IACR Cryptol. ePrint Arch. 2015: 566 (2015) - [i22]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks. IACR Cryptol. ePrint Arch. 2015: 1135 (2015) - [i21]Takahiro Matsuda, Goichiro Hanaoka:
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption. IACR Cryptol. ePrint Arch. 2015: 1149 (2015) - 2014
- [j30]Kazuto Ogawa, Go Ohtake, Arisa Fujii, Goichiro Hanaoka:
Weakened Anonymity of Group Signature and Its Application to Subscription Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1240-1258 (2014) - [j29]Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt:
Group signature implies public-key encryption with non-interactive opening. Int. J. Inf. Sec. 13(1): 51-62 (2014) - [c98]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c97]Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. ACNS 2014: 419-437 - [c96]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. CRYPTO (2) 2014: 90-107 - [c95]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security. ICICS 2014: 176-190 - [c94]Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks. ICISC 2014: 84-100 - [c93]Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
More Constructions of Re-splittable Threshold Public Key Encryption. IWSEC 2014: 109-118 - [c92]Takahiro Matsuda, Goichiro Hanaoka:
Chosen Ciphertext Security via UCE. Public Key Cryptography 2014: 56-76 - [c91]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. Public Key Cryptography 2014: 275-292 - [c90]Kazuki Yoneyama, Goichiro Hanaoka:
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. ProvSec 2014: 178-193 - [c89]Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. ProvSec 2014: 309-316 - [c88]Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. SCN 2014: 558-577 - [c87]Takahiro Matsuda, Goichiro Hanaoka:
Chosen Ciphertext Security via Point Obfuscation. TCC 2014: 95-120 - [c86]Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. TrustCom 2014: 565-574 - [e3]Keita Emura, Goichiro Hanaoka, Yunlei Zhao:
ASIAPKC'14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan. ACM 2014, ISBN 978-1-4503-2801-2 [contents] - [i20]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 181 (2014) - [i19]Takahiro Matsuda, Goichiro Hanaoka:
Chosen Ciphertext Security via Point Obfuscation. IACR Cryptol. ePrint Arch. 2014: 269 (2014) - [i18]Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda:
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions. IACR Cryptol. ePrint Arch. 2014: 950 (2014) - 2013
- [j28]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Methods for Restricting Message Space in Public-Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1156-1168 (2013) - [j27]Koji Nuida, Goichiro Hanaoka:
On the Security of Pseudorandomized Information-Theoretically Secure Schemes. IEEE Trans. Inf. Theory 59(1): 635-652 (2013) - [c85]Goichiro Hanaoka:
On the properties of public key encryption from group signatures. AsiaPKC@AsiaCCS 2013: 1-2 - [c84]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism. AsiaPKC@AsiaCCS 2013: 23-32 - [c83]Kazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka:
A group signature scheme with unbounded message-dependent opening. AsiaCCS 2013: 517-522 - [c82]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. ISC 2013: 100-109 - [c81]Takahiro Matsuda, Goichiro Hanaoka:
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption. IWSEC 2013: 226-243 - [c80]Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. Public Key Cryptography 2013: 32-50 - [c79]Takahiro Matsuda, Goichiro Hanaoka:
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited. Public Key Cryptography 2013: 332-351 - [c78]Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. SECRYPT 2013: 339-346 - [e2]Kaoru Kurosawa, Goichiro Hanaoka:
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7778, Springer 2013, ISBN 978-3-642-36361-0 [contents] - [i17]Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. IACR Cryptol. ePrint Arch. 2013: 390 (2013) - 2012
- [c77]Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. CRYPTO 2012: 812-831 - [c76]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. CT-RSA 2012: 260-277 - [c75]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c74]Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai:
Ciphertext Policy Multi-dimensional Range Encryption. ICISC 2012: 247-261 - [c73]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote:
Group Signatures with Message-Dependent Opening. Pairing 2012: 270-294 - [c72]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Space Efficient Signature Schemes from the RSA Assumption. Public Key Cryptography 2012: 102-119 - [c71]Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Public Key Cryptography 2012: 243-261 - [c70]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms. Public Key Cryptography 2012: 576-594 - [c69]Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. Public Key Cryptography 2012: 595-608 - [c68]Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta:
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. Public Key Cryptography 2012: 715-732 - [c67]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-Specific Encryption from Forward-Secure Encryption. SCN 2012: 184-204 - [e1]Goichiro Hanaoka, Toshihiro Yamauchi:
Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Lecture Notes in Computer Science 7631, Springer 2012, ISBN 978-3-642-34116-8 [contents] - [i16]Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta:
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. IACR Cryptol. ePrint Arch. 2012: 431 (2012) - [i15]Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. IACR Cryptol. ePrint Arch. 2012: 448 (2012) - 2011
- [j26]Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 92-103 (2011) - [j25]Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang:
Sequential Bitwise Sanitizable Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 392-404 (2011) - [j24]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j23]Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta:
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1293-1305 (2011) - [j22]Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Nuttapong Attrapadung, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
Secure Broadcast System with Simultaneous Individual Messaging. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1328-1337 (2011) - [c66]Jacob C. N. Schuldt, Goichiro Hanaoka:
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks. ACNS 2011: 413-430 - [c65]Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Towards Restricting Plaintext Space in Public Key Encryption. IWSEC 2011: 193-209 - [c64]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Public Key Cryptography 2011: 71-89 - [c63]Jian Weng, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Public Key Cryptography 2011: 284-295 - 2010
- [j21]Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa:
Efficient Provider Authentication for Bidirectional Broadcasting Service. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1039-1051 (2010) - [j20]Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1984-1993 (2010) - [j19]Goichiro Hanaoka, Kaoru Kurosawa:
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1994-2006 (2010) - [c62]Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka:
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. CT-RSA 2010: 284-301 - [c61]Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. ISC 2010: 299-306 - [c60]Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta:
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model. IWSEC 2010: 55-69 - [c59]Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE. IWSEC 2010: 181-198 - [c58]Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa:
Efficient Broadcast Encryption with Personalized Messages. ProvSec 2010: 214-228 - [c57]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. ProvSec 2010: 229-243 - [c56]Goichiro Hanaoka, Jian Weng:
Generic Constructions of Parallel Key-Insulated Encryption. SCN 2010: 36-53 - [c55]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [p1]Yang Cui, Goichiro Hanaoka:
Applications of Signcryption. Practical Signcryption 2010: 241-256 - [i14]Goichiro Hanaoka, Kaoru Kurosawa:
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption. IACR Cryptol. ePrint Arch. 2010: 35 (2010) - [i13]Koji Nuida, Goichiro Hanaoka:
On the Security of Pseudorandomized Information-Theoretically Secure Schemes. IACR Cryptol. ePrint Arch. 2010: 329 (2010) - [i12]Goichiro Hanaoka, Jian Weng:
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes. IACR Cryptol. ePrint Arch. 2010: 468 (2010)
2000 – 2009
- 2009
- [j18]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 53-66 (2009) - [j17]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A Trade-off Traitor Tracing Scheme. IEICE Trans. Inf. Syst. 92-D(5): 859-875 (2009) - [j16]Yang Cui, Goichiro Hanaoka, Hideki Imai:
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions. IEICE Trans. Inf. Syst. 92-D(5): 967-970 (2009) - [c54]Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa:
On the Theoretical Gap between Group Signatures with and without Unlinkability. AFRICACRYPT 2009: 149-166 - [c53]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c52]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 - [c51]Koji Nuida, Goichiro Hanaoka:
On the Security of Pseudorandomized Information-Theoretically Secure Schemes. ICITS 2009: 56-73 - [c50]Koji Nuida, Goichiro Hanaoka:
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes. ICITS 2009: 213-230 - [i11]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i10]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i9]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - 2008
- [j15]Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 392-402 (2008) - [j14]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Trans. Inf. Syst. 91-D(5): 1466-1476 (2008) - [j13]Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2405-2407 (2008) - [c49]Goichiro Hanaoka, Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ASIACRYPT 2008: 308-325 - [c48]Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa:
An Efficient Strong Key-Insulated Signature Scheme and Its Application. EuroPKI 2008: 150-165 - [c47]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 - [c46]Goichiro Hanaoka:
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). ICITS 2008: 223-231 - [c45]Jun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka:
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. INDOCRYPT 2008: 116-129 - [c44]Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 - [i8]Goichiro Hanaoka, Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. IACR Cryptol. ePrint Arch. 2008: 211 (2008) - 2007
- [j12]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 1000-1011 (2007) - [j11]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1803-1813 (2007) - [j10]Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1814-1829 (2007) - [j9]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Extension of Broadcasting Service by Using Electronic Tokens. IEICE Trans. Inf. Syst. 90-D(11): 1741-1750 (2007) - [c43]Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 - [c42]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 - [c41]Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use. ICITS 2007: 133-145 - [c40]Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:
Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 - [c39]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974 - [c38]Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa:
Anonymous Authentication Scheme for Subscription Services. KES (3) 2007: 975-983 - [c37]Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 - [c36]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84 - [c35]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 - [i7]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IACR Cryptol. ePrint Arch. 2007: 30 (2007) - 2006
- [j8]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006) - [j7]Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai:
Relations among Notions of Security for Identity Based Encryption Schemes. Inf. Media Technol. 1(2): 929-941 (2006) - [c34]Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162 - [c33]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c32]Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai:
A Short Random Fingerprinting Code Against a Small Number of Pirates. AAECC 2006: 193-202 - [c31]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ACISP 2006: 123-135 - [c30]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c29]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 - [c28]Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps. AsiaCCS 2006: 343-354 - [c27]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - [c26]Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai:
Parallel Key-Insulated Public Key Encryption. Public Key Cryptography 2006: 105-122 - [c25]Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384 - [i6]Goichiro Hanaoka, Hideki Imai:
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. IACR Cryptol. ePrint Arch. 2006: 408 (2006) - 2005
- [j6]JaeGwi Choi, Goichiro Hanaoka, Kyung Hyune Rhee, Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2800-2807 (2005) - [c24]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514 - [c23]Goichiro Hanaoka:
Unconditionally secure signatures and its related schemes. ICITS 2005: 7-12 - [c22]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A secure traitor tracing scheme against key exposure. ISIT 2005: 1873-1877 - [i5]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A Secure Traitor Tracing Scheme against Key Exposure. CoRR abs/cs/0508011 (2005) - [i4]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 258 (2005) - [i3]Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IACR Cryptol. ePrint Arch. 2005: 320 (2005) - 2004
- [j5]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 120-130 (2004) - [j4]Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai:
Managing Encryption and Key Publication Independently in Digital Rights Management Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 160-172 (2004) - [c21]Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 - [c20]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 - [c19]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 - [c18]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - [i2]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. IACR Cryptol. ePrint Arch. 2004: 338 (2004) - 2003
- [c17]Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376 - [c16]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 - [c15]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441 - [i1]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptol. ePrint Arch. 2003: 181 (2003) - 2002
- [j3]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) - [j2]Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 140-148 (2002) - [j1]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
A Traitor Traceable Conference System with Dynamic Sender. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 167-174 (2002) - [c14]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99 - [c13]Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 - [c12]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96 - [c11]Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Traceability Schemes for Signed Documents. ISC 2002: 257-271 - [c10]Hideki Imai, Goichiro Hanaoka, Junji Shikata, Akira Otsuka, Anderson C. A. Nascimento:
Cryptography with information theoretic security. ITW 2002: 73 - [c9]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 - 2001
- [c8]Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407 - [c7]Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239 - 2000
- [c6]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 - [c5]Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai:
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ISW 2000: 224-236
1990 – 1999
- 1999
- [c4]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 - [c3]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 - [c2]Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai:
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ISW 1999: 259-270 - 1998
- [c1]Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint