National Institute of Advanced Industrial Science and Technology, until 2006: University of Tokyo
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
16 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: A generic construction of useful client puzzles. ASIACCS 2009: 70-79 |
2008 | ||
15 | EE | Rui Zhang, Hideki Imai: Strong Anonymous Signatures. Inscrypt 2008: 60-71 |
2007 | ||
14 | EE | Rui Zhang: Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. ACNS 2007: 323-339 |
13 | EE | Rui Zhang, Hideki Imai: Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 |
12 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 |
11 | EE | Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 |
10 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007) |
2006 | ||
9 | EE | Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 |
8 | EE | Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 |
7 | EE | Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 |
6 | EE | Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 |
2005 | ||
5 | EE | Rui Zhang, Jun Furukawa, Hideki Imai: Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 |
4 | EE | Rui Zhang, Hideki Imai: Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 |
2004 | ||
3 | EE | Rui Zhang, Goichiro Hanaoka, Hideki Imai: On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 |
2 | EE | Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 |
2003 | ||
1 | EE | Rui Zhang, Hideki Imai: Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 |
1 | Nuttapong Attrapadung | [6] [7] [10] |
2 | Yang Cui | [6] [11] |
3 | Eiichiro Fujisaki | [11] |
4 | Jun Furukawa | [5] [7] [10] |
5 | David Galindo | [6] |
6 | Takeshi Gomi | [7] [10] |
7 | Goichiro Hanaoka | [2] [3] [6] [7] [8] [9] [10] [11] [12] [16] |
8 | Ichiro Hasuo | [6] |
9 | Hideki Imai | [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [15] [16] |
10 | Takashi Kitagawa | [8] [9] |
11 | Kanta Matsuura | [6] [8] [9] |
12 | Junji Shikata | [2] |
13 | Hajime Watanabe | [8] |
14 | Peng Yang | [6] [8] [9] |