2009 |
60 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
A generic construction of useful client puzzles.
ASIACCS 2009: 70-79 |
59 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
CT-RSA 2009: 16-31 |
2008 |
58 | EE | Goichiro Hanaoka,
Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
ASIACRYPT 2008: 308-325 |
57 | EE | Go Ohtake,
Goichiro Hanaoka,
Kazuto Ogawa:
An Efficient Strong Key-Insulated Signature Scheme and Its Application.
EuroPKI 2008: 150-165 |
56 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
ICISC 2008: 1-19 |
55 | EE | Goichiro Hanaoka:
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).
ICITS 2008: 223-231 |
54 | EE | Jun Furukawa,
Nuttapong Attrapadung,
Ryuichi Sakai,
Goichiro Hanaoka:
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.
INDOCRYPT 2008: 116-129 |
53 | EE | Goichiro Hanaoka,
Hideki Imai,
Kazuto Ogawa,
Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
IWSEC 2008: 20-33 |
52 | EE | Hideki Imai,
Goichiro Hanaoka,
Ueli M. Maurer,
Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security.
IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) |
51 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme.
IEICE Transactions 91-A(1): 392-402 (2008) |
50 | EE | Takahiro Matsuda,
Nuttapong Attrapadung,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Transactions 91-D(5): 1466-1476 (2008) |
2007 |
49 | EE | Ronald Cramer,
Goichiro Hanaoka,
Dennis Hofheinz,
Hideki Imai,
Eike Kiltz,
Rafael Pass,
Abhi Shelat,
Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption.
ASIACRYPT 2007: 502-518 |
48 | EE | Kazuto Ogawa,
Go Ohtake,
Goichiro Hanaoka,
Hideki Imai:
Trade-Off Traitor Tracing.
INDOCRYPT 2007: 331-340 |
47 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited.
Inscrypt 2007: 313-327 |
46 | EE | Takahiro Matsuda,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A Practical Provider Authentication System for Bidirectional Broadcast Service.
KES (3) 2007: 967-974 |
45 | EE | Arisa Fujii,
Go Ohtake,
Goichiro Hanaoka,
Kazuto Ogawa:
Anonymous Authentication Scheme for Subscription Services.
KES (3) 2007: 975-983 |
44 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing.
KES (3) 2007: 984-991 |
43 | EE | Yang Cui,
Eiichiro Fujisaki,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption.
ProvSec 2007: 218-227 |
42 | EE | Takahiro Matsuda,
Nuttapong Attrapadung,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
ProvSec 2007: 68-84 |
41 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Transactions 90-A(5): 1000-1011 (2007) |
40 | EE | Nuttapong Attrapadung,
Jun Furukawa,
Takeshi Gomi,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Transactions 90-A(9): 1803-1813 (2007) |
39 | EE | Thi Lan Anh Phan,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Transactions 90-A(9): 1814-1829 (2007) |
38 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Transactions 90-D(11): 1741-1750 (2007) |
2006 |
37 | EE | Goichiro Hanaoka,
Yumiko Hanaoka,
Manabu Hagiwara,
Hajime Watanabe,
Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
AAECC 2006: 154-162 |
36 | EE | Peng Yang,
Takashi Kitagawa,
Goichiro Hanaoka,
Rui Zhang,
Kanta Matsuura,
Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption.
AAECC 2006: 183-192 |
35 | EE | Manabu Hagiwara,
Goichiro Hanaoka,
Hideki Imai:
A Short Random Fingerprinting Code Against a Small Number of Pirates.
AAECC 2006: 193-202 |
34 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
ACISP 2006: 123-135 |
33 | EE | Takashi Kitagawa,
Peng Yang,
Goichiro Hanaoka,
Rui Zhang,
Hajime Watanabe,
Kanta Matsuura,
Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
ACISP 2006: 348-359 |
32 | EE | Kunihiko Miyazaki,
Goichiro Hanaoka,
Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps.
ASIACCS 2006: 343-354 |
31 | EE | Nuttapong Attrapadung,
Jun Furukawa,
Takeshi Gomi,
Goichiro Hanaoka,
Hideki Imai,
Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction.
CANS 2006: 19-36 |
30 | EE | Nuttapong Attrapadung,
Yang Cui,
David Galindo,
Goichiro Hanaoka,
Ichiro Hasuo,
Hideki Imai,
Kanta Matsuura,
Peng Yang,
Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes.
LATIN 2006: 130-141 |
29 | EE | Goichiro Hanaoka,
Yumiko Hanaoka,
Hideki Imai:
Parallel Key-Insulated Public Key Encryption.
Public Key Cryptography 2006: 105-122 |
28 | EE | Thi Lan Anh Phan,
Yumiko Hanaoka,
Goichiro Hanaoka,
Kanta Matsuura,
Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
VIETCRYPT 2006: 366-384 |
27 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J. 49(3): 310-321 (2006) |
2005 |
26 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
ASIACRYPT 2005: 495-514 |
25 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Hideki Imai:
A Secure Traitor Tracing Scheme against Key Exposure
CoRR abs/cs/0508011: (2005) |
24 | EE | JaeGwi Choi,
Goichiro Hanaoka,
KyungHyune Rhee,
Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Transactions 88-A(10): 2800-2807 (2005) |
2004 |
23 | EE | Goichiro Hanaoka,
Hideki Imai,
Jörn Müller-Quade,
Anderson C. A. Nascimento,
Akira Otsuka,
Andreas Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
ACISP 2004: 62-73 |
22 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Akira Otsuka,
Goichiro Hanaoka,
Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
ACNS 2004: 355-368 |
21 | EE | Rui Zhang,
Goichiro Hanaoka,
Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform.
ACNS 2004: 76-90 |
20 | EE | Rui Zhang,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Public Key Cryptography 2004: 360-374 |
19 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions 87-A(1): 120-130 (2004) |
18 | EE | Goichiro Hanaoka,
Kazuto Ogawa,
Itsuro Murota,
Go Ohtake,
Keigo Majima,
Seiichi Gohshi,
Kimiyuki Oyamada,
Seiichi Namba,
Hideki Imai:
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Transactions 87-A(1): 160-172 (2004) |
2003 |
17 | EE | Goichiro Hanaoka,
Kazuto Ogawa,
Itsuro Murota,
Go Ohtake,
Keigo Majima,
Kimiyuki Oyamada,
Seiichi Gohshi,
Seiichi Namba,
Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems.
ACISP 2003: 365-376 |
16 | EE | Anderson C. A. Nascimento,
Jörn Müller-Quade,
Akira Otsuka,
Goichiro Hanaoka,
Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
ISC 2003: 151-164 |
15 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes.
ISC 2003: 428-441 |
2002 |
14 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
ASIACRYPT 2002: 81-99 |
13 | EE | Junji Shikata,
Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes.
EUROCRYPT 2002: 434-449 |
12 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
ICICS 2002: 85-96 |
11 | EE | Shoko Yonezawa,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Traceability Schemes for Signed Documents.
ISC 2002: 257-271 |
10 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Public Key Cryptography 2002: 64-79 |
9 | EE | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J. 45(3): 293-303 (2002) |
2001 |
8 | EE | Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
CT-RSA 2001: 392-407 |
7 | EE | Hirotaka Komaki,
Yuji Watanabe,
Goichiro Hanaoka,
Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Public Key Cryptography 2001: 225-239 |
2000 |
6 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
ASIACRYPT 2000: 130-142 |
5 | EE | Daisuke Nojiri,
Goichiro Hanaoka,
Hideki Imai:
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
ISW 2000: 224-236 |
1999 |
4 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
ASIACRYPT 1999: 348-362 |
3 | | Goichiro Hanaoka,
Tsuyoshi Nishioka,
Yuliang Zheng,
Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
ICICS 1999: 157-168 |
2 | EE | Tsuyoshi Nishioka,
Goichiro Hanaoka,
Hideki Imai:
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
ISW 1999: 259-270 |
1998 |
1 | EE | Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
ACISP 1998: 215-226 |