dblp.uni-trier.dewww.uni-trier.de

Goichiro Hanaoka

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
60EERui Zhang, Goichiro Hanaoka, Hideki Imai: A generic construction of useful client puzzles. ASIACCS 2009: 70-79
59EETakahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31
2008
58EEGoichiro Hanaoka, Kaoru Kurosawa: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ASIACRYPT 2008: 308-325
57EEGo Ohtake, Goichiro Hanaoka, Kazuto Ogawa: An Efficient Strong Key-Insulated Signature Scheme and Its Application. EuroPKI 2008: 150-165
56EETakahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19
55EEGoichiro Hanaoka: Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). ICITS 2008: 223-231
54EEJun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka: A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. INDOCRYPT 2008: 116-129
53EEGoichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe: Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33
52EEHideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008)
51EEKunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Invisibly Sanitizable Digital Signature Scheme. IEICE Transactions 91-A(1): 392-402 (2008)
50EETakahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Transactions 91-D(5): 1466-1476 (2008)
2007
49EERonald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan: Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518
48EEKazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai: Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340
47EERui Zhang, Goichiro Hanaoka, Hideki Imai: Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327
46EETakahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974
45EEArisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa: Anonymous Authentication Scheme for Subscription Services. KES (3) 2007: 975-983
44EEKazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991
43EEYang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227
42EETakahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84
41EEKazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service. IEICE Transactions 90-A(5): 1000-1011 (2007)
40EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007)
39EEThi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Transactions 90-A(9): 1814-1829 (2007)
38EEKazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Extension of Broadcasting Service by Using Electronic Tokens. IEICE Transactions 90-D(11): 1741-1750 (2007)
2006
37EEGoichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai: Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162
36EEPeng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192
35EEManabu Hagiwara, Goichiro Hanaoka, Hideki Imai: A Short Random Fingerprinting Code Against a Small Number of Pirates. AAECC 2006: 193-202
34EEKazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ACISP 2006: 123-135
33EETakashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359
32EEKunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Digitally signed document sanitizing scheme based on bilinear maps. ASIACCS 2006: 343-354
31EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36
30EENuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141
29EEGoichiro Hanaoka, Yumiko Hanaoka, Hideki Imai: Parallel Key-Insulated Public Key Encryption. Public Key Cryptography 2006: 105-122
28EEThi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384
27EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006)
2005
26EEYumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514
25EEKazuto Ogawa, Goichiro Hanaoka, Hideki Imai: A Secure Traitor Tracing Scheme against Key Exposure CoRR abs/cs/0508011: (2005)
24EEJaeGwi Choi, Goichiro Hanaoka, KyungHyune Rhee, Hideki Imai: How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Transactions 88-A(10): 2800-2807 (2005)
2004
23EEGoichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter: Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73
22EEAnderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368
21EERui Zhang, Goichiro Hanaoka, Hideki Imai: On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90
20EERui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374
19EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient Unconditionally Secure Digital Signatures. IEICE Transactions 87-A(1): 120-130 (2004)
18EEGoichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai: Managing Encryption and Key Publication Independently in Digital Rights Management Systems. IEICE Transactions 87-A(1): 160-172 (2004)
2003
17EEGoichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai: Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376
16EEAnderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164
15EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441
2002
14EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99
13EEJunji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449
12EEYumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96
11EEShoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Traceability Schemes for Signed Documents. ISC 2002: 257-271
10EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79
9EEGoichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002)
2001
8EEYuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407
7EEHirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239
2000
6EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142
5EEDaisuke Nojiri, Goichiro Hanaoka, Hideki Imai: A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ISW 2000: 224-236
1999
4 Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362
3 Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168
2EETsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai: A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ISW 1999: 259-270
1998
1EEGoichiro Hanaoka, Yuliang Zheng, Hideki Imai: LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226

Coauthor Index

1Nuttapong Attrapadung [30] [31] [40] [42] [50] [54]
2JaeGwi Choi [24]
3Ronald Cramer [49]
4Yang Cui [30] [43]
5Arisa Fujii [45]
6Eiichiro Fujisaki [43]
7Jun Furukawa [31] [40] [54]
8David Galindo [30]
9Seiichi Gohshi [17] [18]
10Takeshi Gomi [31] [40]
11Manabu Hagiwara [35] [37]
12Yumiko Hanaoka [12] [14] [15] [26] [27] [28] [29] [37]
13Ichiro Hasuo [30]
14Dennis Hofheinz [49]
15Hideki Imai [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [46] [47] [48] [49] [50] [51] [52] [53] [56] [59] [60]
16Eike Kiltz [49]
17Takashi Kitagawa [33] [36]
18Kazukuni Kobara [44]
19Hirotaka Komaki [7]
20Kaoru Kurosawa [58]
21Keigo Majima [17] [18]
22Takahiro Matsuda [42] [46] [50] [56] [59]
23Kanta Matsuura [28] [30] [33] [36] [39] [42] [44] [46] [50] [56] [59]
24Ueli M. Maurer [52]
25Kunihiko Miyazaki [32] [51]
26Jörn Müller-Quade [16] [22] [23]
27Itsuro Murota [17] [18]
28Seiichi Namba [17] [18]
29Anderson C. A. Nascimento [16] [22] [23]
30Tsuyoshi Nishioka [2] [3] [4] [9]
31Daisuke Nojiri [5]
32Kazuto Ogawa [17] [18] [25] [34] [38] [41] [44] [45] [48] [53] [57]
33Go Ohtake [17] [18] [45] [48] [57]
34Akira Otsuka [16] [22] [23]
35Kimiyuki Oyamada [17] [18]
36Rafael Pass [49]
37Thi Lan Anh Phan [28] [39]
38KyungHyune Rhee [24]
39Ryuichi Sakai [54]
40Abhi Shelat [49]
41Junji Shikata [6] [10] [11] [12] [13] [14] [15] [19] [20] [26] [27]
42Vinod Vaikuntanathan (V. Vinod) [49]
43Hajime Watanabe [33] [37] [53]
44Yuji Watanabe [7] [8]
45Andreas Winter [23]
46Peng Yang [30] [33] [36]
47Shoko Yonezawa [11]
48Rui Zhang [20] [21] [30] [31] [33] [36] [40] [43] [47] [60]
49Yuliang Zheng [1] [3] [4] [6] [9] [10] [13] [19] [52]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)