dblp.uni-trier.dewww.uni-trier.de

Rui Zhang

National Institute of Advanced Industrial Science and Technology, until 2006: University of Tokyo

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
16EERui Zhang, Goichiro Hanaoka, Hideki Imai: A generic construction of useful client puzzles. ASIACCS 2009: 70-79
2008
15EERui Zhang, Hideki Imai: Strong Anonymous Signatures. Inscrypt 2008: 60-71
2007
14EERui Zhang: Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. ACNS 2007: 323-339
13EERui Zhang, Hideki Imai: Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174
12EERui Zhang, Goichiro Hanaoka, Hideki Imai: Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327
11EEYang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227
10EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007)
2006
9EEPeng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192
8EETakashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359
7EENuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36
6EENuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141
2005
5EERui Zhang, Jun Furukawa, Hideki Imai: Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498
4EERui Zhang, Hideki Imai: Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41
2004
3EERui Zhang, Goichiro Hanaoka, Hideki Imai: On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90
2EERui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374
2003
1EERui Zhang, Hideki Imai: Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110

Coauthor Index

1Nuttapong Attrapadung [6] [7] [10]
2Yang Cui [6] [11]
3Eiichiro Fujisaki [11]
4Jun Furukawa [5] [7] [10]
5David Galindo [6]
6Takeshi Gomi [7] [10]
7Goichiro Hanaoka [2] [3] [6] [7] [8] [9] [10] [11] [12] [16]
8Ichiro Hasuo [6]
9Hideki Imai [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [15] [16]
10Takashi Kitagawa [8] [9]
11Kanta Matsuura [6] [8] [9]
12Junji Shikata [2]
13Hajime Watanabe [8]
14Peng Yang [6] [8] [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)