2009 | ||
---|---|---|
60 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: A generic construction of useful client puzzles. ASIACCS 2009: 70-79 |
59 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 |
2008 | ||
58 | EE | Goichiro Hanaoka, Kaoru Kurosawa: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ASIACRYPT 2008: 308-325 |
57 | EE | Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa: An Efficient Strong Key-Insulated Signature Scheme and Its Application. EuroPKI 2008: 150-165 |
56 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 |
55 | EE | Goichiro Hanaoka: Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). ICITS 2008: 223-231 |
54 | EE | Jun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka: A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. INDOCRYPT 2008: 116-129 |
53 | EE | Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe: Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 |
52 | EE | Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) |
51 | EE | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Invisibly Sanitizable Digital Signature Scheme. IEICE Transactions 91-A(1): 392-402 (2008) |
50 | EE | Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Transactions 91-D(5): 1466-1476 (2008) |
2007 | ||
49 | EE | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan: Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 |
48 | EE | Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai: Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 |
47 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 |
46 | EE | Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974 |
45 | EE | Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa: Anonymous Authentication Scheme for Subscription Services. KES (3) 2007: 975-983 |
44 | EE | Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 |
43 | EE | Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 |
42 | EE | Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84 |
41 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service. IEICE Transactions 90-A(5): 1000-1011 (2007) |
40 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007) |
39 | EE | Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Transactions 90-A(9): 1814-1829 (2007) |
38 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Extension of Broadcasting Service by Using Electronic Tokens. IEICE Transactions 90-D(11): 1741-1750 (2007) |
2006 | ||
37 | EE | Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai: Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162 |
36 | EE | Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 |
35 | EE | Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai: A Short Random Fingerprinting Code Against a Small Number of Pirates. AAECC 2006: 193-202 |
34 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ACISP 2006: 123-135 |
33 | EE | Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 |
32 | EE | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai: Digitally signed document sanitizing scheme based on bilinear maps. ASIACCS 2006: 343-354 |
31 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 |
30 | EE | Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 |
29 | EE | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai: Parallel Key-Insulated Public Key Encryption. Public Key Cryptography 2006: 105-122 |
28 | EE | Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384 |
27 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006) |
2005 | ||
26 | EE | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514 |
25 | EE | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai: A Secure Traitor Tracing Scheme against Key Exposure CoRR abs/cs/0508011: (2005) |
24 | EE | JaeGwi Choi, Goichiro Hanaoka, KyungHyune Rhee, Hideki Imai: How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Transactions 88-A(10): 2800-2807 (2005) |
2004 | ||
23 | EE | Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter: Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 |
22 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 |
21 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 |
20 | EE | Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 |
19 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient Unconditionally Secure Digital Signatures. IEICE Transactions 87-A(1): 120-130 (2004) |
18 | EE | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai: Managing Encryption and Key Publication Independently in Digital Rights Management Systems. IEICE Transactions 87-A(1): 160-172 (2004) |
2003 | ||
17 | EE | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai: Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376 |
16 | EE | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai: Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 |
15 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441 |
2002 | ||
14 | EE | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99 |
13 | EE | Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 |
12 | EE | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96 |
11 | EE | Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Traceability Schemes for Signed Documents. ISC 2002: 257-271 |
10 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 |
9 | EE | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) |
2001 | ||
8 | EE | Yuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407 |
7 | EE | Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai: Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239 |
2000 | ||
6 | EE | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 |
5 | EE | Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai: A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ISW 2000: 224-236 |
1999 | ||
4 | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 | |
3 | Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 | |
2 | EE | Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai: A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ISW 1999: 259-270 |
1998 | ||
1 | EE | Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226 |