Hayata, Junichiro; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Matsuura, Kanta On private information retrieval supporting range queries. (English) Zbl 1511.68044 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020). MSC: 68M25 68P20 68P27 94A62 PDFBibTeX XMLCite \textit{J. Hayata} et al., Lect. Notes Comput. Sci. 12309, 674--694 (2020; Zbl 1511.68044) Full Text: DOI
Hanaoka, Goichiro; Komatsu, Misaki; Ohara, Kazuma; Sakai, Yusuke; Yamada, Shota Semantic definition of anonymity in identity-based encryption and its relation to indistinguishability-based definition. (English) Zbl 1511.68043 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 65-85 (2020). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 12309, 65--85 (2020; Zbl 1511.68043) Full Text: DOI
Morita, Hiraku; Attrapadung, Nuttapong; Teruya, Tadanori; Ohata, Satsuya; Nuida, Koji; Hanaoka, Goichiro Constant-round client-aided secure comparison protocol. (English) Zbl 1522.68228 Lopez, Javier (ed.) et al., Computer security. 23rd European symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11099, 395-415 (2018). MSC: 68Q10 94A60 94A62 PDFBibTeX XMLCite \textit{H. Morita} et al., Lect. Notes Comput. Sci. 11099, 395--415 (2018; Zbl 1522.68228) Full Text: DOI
Yasuda, Satoshi; Koseki, Yoshihiro; Sakai, Yusuke; Kitagawa, Fuyuki; Kawai, Yutaka; Hanaoka, Goichiro Formal treatment of verifiable privacy-preserving data-aggregation protocols. (English) Zbl 1443.94085 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 415-422 (2018). MSC: 94A60 94A62 68P27 PDFBibTeX XMLCite \textit{S. Yasuda} et al., Lect. Notes Comput. Sci. 11192, 415--422 (2018; Zbl 1443.94085) Full Text: DOI
Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. (English) Zbl 1448.94204 Catalano, Dario (ed.) et al., Security and cryptography for networks. 11th international conference, SCN 2018, Amalfi, Italy, September 5–7, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11035, 140-159 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Hara} et al., Lect. Notes Comput. Sci. 11035, 140--159 (2018; Zbl 1448.94204) Full Text: DOI
Yamada, Kotoko; Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Tanaka, Keisuke Generic constructions for fully secure revocable attribute-based encryption. (English) Zbl 1522.68092 Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10493, 532-551 (2017). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{K. Yamada} et al., Lect. Notes Comput. Sci. 10493, 532--551 (2017; Zbl 1522.68092) Full Text: DOI
Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro Secure grouping protocol using a deck of cards. (English) Zbl 1417.94062 Shikata, Junji (ed.), Information theoretic security. 10th international conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10681, 135-152 (2017). MSC: 94A60 68P25 68M12 PDFBibTeX XMLCite \textit{Y. Hashimoto} et al., Lect. Notes Comput. Sci. 10681, 135--152 (2017; Zbl 1417.94062) Full Text: DOI arXiv
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke Signatures resilient to uninvertible leakage. (English) Zbl 1482.94073 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 372-390 (2016). MSC: 94A62 68M25 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 9841, 372--390 (2016; Zbl 1482.94073) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota Attribute-based encryption for range attributes. (English) Zbl 1400.94114 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 42-61 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 9841, 42--61 (2016; Zbl 1400.94114) Full Text: DOI
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9241, 281--297 (2015; Zbl 1398.68145) Full Text: DOI
Teruya, Tadanori; Nuida, Koji; Shimizu, Kana; Hanaoka, Goichiro On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015). MSC: 68P25 92D10 94A60 PDFBibTeX XMLCite \textit{T. Teruya} et al., Lect. Notes Comput. Sci. 9241, 242--261 (2015; Zbl 1398.68148) Full Text: DOI
Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu A signature scheme with a fuzzy private key. (English) Zbl 1348.94073 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-28165-0/pbk; 978-3-319-28166-7/ebook). Lecture Notes in Computer Science 9092, 105-126 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Takahashi} et al., Lect. Notes Comput. Sci. 9092, 105--126 (2015; Zbl 1348.94073) Full Text: DOI
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei Black-box separations of hash-and-sign signatures in the non-programmable random oracle model. (English) Zbl 1338.94096 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 435-454 (2015). MSC: 94A62 68P25 94A60 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 9451, 435--454 (2015; Zbl 1338.94096) Full Text: DOI
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei All-but-one dual projective hashing and its applications. (English) Zbl 1353.94079 Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 181-198 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 8479, 181--198 (2014; Zbl 1353.94079) Full Text: DOI
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki Ciphertext policy multi-dimensional range encryption. (English) Zbl 1342.94073 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 247-261 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kasamatsu} et al., Lect. Notes Comput. Sci. 7839, 247--261 (2013; Zbl 1342.94073) Full Text: DOI
Hanaoka, Goichiro (ed.); Yamauchi, Toshihiro (ed.) Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. (English) Zbl 1259.68006 Lecture Notes in Computer Science 7631. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). xii, 261 p. (2012). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{G. Hanaoka} (ed.) and \textit{T. Yamauchi} (ed.), Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7--9, 2012. Proceedings. Berlin: Springer (2012; Zbl 1259.68006) Full Text: DOI
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki Time-specific encryption from forward-secure encryption. (English) Zbl 1310.94154 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 184-204 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kasamatsu} et al., Lect. Notes Comput. Sci. 7485, 184--204 (2012; Zbl 1310.94154) Full Text: DOI
Cui, Yang; Hanaoka, Goichiro Applications of signcryption. (English) Zbl 1217.68084 Dent, Alexander W. (ed.) et al., Practical signcryption. With a foreword by Moti Yung. Berlin: Springer (ISBN 978-3-540-89409-4/hbk; 978-3-540-89411-7/ebook). 241-268 (2010). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Y. Cui} and \textit{G. Hanaoka}, in: Practical signcryption. With a foreword by Moti Yung. Berlin: Springer. 241--268 (2010; Zbl 1217.68084) Full Text: DOI
Nuida, Koji; Hanaoka, Goichiro On the security of pseudorandomized information-theoretically secure schemes. (English) Zbl 1282.94061 Kurosawa, Kaoru (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). Lecture Notes in Computer Science 5973, 56-73 (2010). MSC: 94A60 68W20 65C05 94A20 PDFBibTeX XMLCite \textit{K. Nuida} and \textit{G. Hanaoka}, Lect. Notes Comput. Sci. 5973, 56--73 (2010; Zbl 1282.94061) Full Text: DOI
Hanaoka, Goichiro; Weng, Jian Generic constructions of parallel key-insulated encryption. (English) Zbl 1286.68112 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 36-53 (2010). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} and \textit{J. Weng}, Lect. Notes Comput. Sci. 6280, 36--53 (2010; Zbl 1286.68112) Full Text: DOI
Ogawa, Kazuto; Hanaoka, Goichiro; Imai, Hideki Adaptively secure traitor tracing against key exposure and its application to anywhere tv service. (English) Zbl 1176.94053 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 123-135 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{K. Ogawa} et al., Lect. Notes Comput. Sci. 4058, 123--135 (2006; Zbl 1176.94053) Full Text: DOI
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. (English) Zbl 1176.94047 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 348-359 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{T. Kitagawa} et al., Lect. Notes Comput. Sci. 4058, 348--359 (2006; Zbl 1176.94047) Full Text: DOI
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki On the security of cryptosystems with all-or-nothing transform. (English) Zbl 1103.68548 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 76-90 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{R. Zhang} et al., Lect. Notes Comput. Sci. 3089, 76--90 (2004; Zbl 1103.68548) Full Text: DOI
Nascimento, Anderson C. A.; Mueller-Quade, Joern; Otsuka, Akira; Hanaoka, Goichiro; Imai, Hideki Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. (English) Zbl 1103.68532 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 355-368 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{A. C. A. Nascimento} et al., Lect. Notes Comput. Sci. 3089, 355--368 (2004; Zbl 1103.68532) Full Text: DOI
Nascimento, Anderson C. A.; Mueller-Quade, Joern; Otsuka, Akira; Hanaoka, Goichiro; Imai, Hideki Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. (English) Zbl 1255.94063 Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 151-164 (2003). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{A. C. A. Nascimento} et al., Lect. Notes Comput. Sci. 2851, 151--164 (2003; Zbl 1255.94063) Full Text: DOI
Hanaoka, Goichiro; Ogawa, Kazuto; Murota, Itsuro; Ohtake, Go; Majima, Keigo; Oyamada, Kimiyuki; Gohshi, Seiichi; Namba, Seiichi; Imai, Hideki Separating encryption and key issuance in digital rights management systems. (English) Zbl 1042.68570 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 365-376 (2003). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 2727, 365--376 (2003; Zbl 1042.68570) Full Text: Link
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki Efficient and unconditionally secure digital signatures and a security analysis of a multireceiver authentication code. (English) Zbl 1055.94535 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 64-79 (2002). MSC: 94A62 68Q25 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 2274, 64--79 (2002; Zbl 1055.94535) Full Text: Link
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. (English) Zbl 1023.68553 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 85-96 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Hanaoka} et al., Lect. Notes Comput. Sci. 2513, 85--96 (2002; Zbl 1023.68553) Full Text: Link
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki Unconditionally secure anonymous encryption and group authentication. (English) Zbl 1065.94550 Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 81-99 (2002). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 2501, 81--99 (2002; Zbl 1065.94550) Full Text: DOI
Yonezawa, Shoko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki Traceability schemes for signed documents. (English) Zbl 1019.68586 Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 257-271 (2002). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{S. Yonezawa} et al., Lect. Notes Comput. Sci. 2433, 257--271 (2002; Zbl 1019.68586) Full Text: Link
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. (English) Zbl 1011.68038 Comput. J. 45, No. 3, 293-303 (2002). MSC: 68P25 68M10 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Comput. J. 45, No. 3, 293--303 (2002; Zbl 1011.68038) Full Text: DOI Link
Nojiri, Daisuke; Hanaoka, Goichiro; Imai, Hideki A practical implementation of hierarchically structured key predistribution system and its evaluation. (English) Zbl 1044.68609 Pieprzyk, Josef (ed.) et al., Information security. 3rd international workshop, ISW 2000, Wollongong, Australia, December 20–21, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41416-9). Lect. Notes Comput. Sci. 1975, 224-236 (2000). MSC: 68P25 PDFBibTeX XMLCite \textit{D. Nojiri} et al., Lect. Notes Comput. Sci. 1975, 224--236 (2000; Zbl 1044.68609) Full Text: Link
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki An efficient hierarchical identity-based key-sharing method resistant against collusion-attacks. (English) Zbl 0977.94032 Lam, Kwok Yan (ed.) et al., Advances in cryptology - ASIACRYPT ’99. International conference on the theory and application of cryptology and information security, Singapore, November 14-18, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1716, 348-362 (1999). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 1716, 348--362 (1999; Zbl 0977.94032)
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki LITESET: A light-weight secure electronic transaction protocol. (English) Zbl 0902.68056 Boyd, Colin (ed.) et al., Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1438, 215-226 (1998). MSC: 68P25 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 1438, 215--226 (1998; Zbl 0902.68056)