×

zbMATH — the first resource for mathematics

Hanaoka, Goichiro

Compute Distance To:
Author ID: hanaoka.goichiro Recent zbMATH articles by "Hanaoka, Goichiro"
Published as: Hanaoka, Goichiro
External Links: ORCID
Documents Indexed: 127 Publications since 1998, including 2 Books
all top 5

Co-Authors

2 single-authored
41 Imai, Hideki
31 Matsuda, Takahiro
18 Yamada, Shota
17 Attrapadung, Nuttapong
13 Kunihiro, Noboru
12 Emura, Keita
12 Sakai, Yusuke
11 Nuida, Koji
10 Matsuura, Kanta
10 Schuldt, Jacob C. N.
10 Shikata, Junji
10 Tanaka, Keisuke
9 Zhang, Rui
8 Ohtake, Go
8 Zheng, Yuliang
7 Hanaoka, Yumiko
7 Ogawa, Kazuto
7 Yamakawa, Takashi
6 Kawai, Yutaka
6 Kitagawa, Fuyuki
5 Nishide, Takashi
5 Okamoto, Eiji
4 Nishioka, Tsuyoshi
4 Ohta, Kazuo
4 Shinagawa, Kazumasa
4 Zhao, Yunlei
3 Cui, Yang
3 Müller-Quade, Jörn
3 Murakami, Takao
3 Nascimento, Anderson C. A.
3 Otsuka, Akira
3 Takahashi, Kenta
3 Teruya, Tadanori
3 Wang, Yuyu
3 Watanabe, Hajime
3 Weng, Jian
3 Yang, Peng
3 Zhang, Zongyang
2 Cao, Zhenfu
2 Chen, Yu
2 Chow, Sherman S. M.
2 Furukawa, Jun
2 Hagiwara, Manabu
2 Hara, Keisuke
2 Ishida, Ai
2 Kanayama, Naoki
2 Kasamatsu, Kohei
2 Kitagawa, Takashi
2 Koseki, Yoshihiro
2 Kurosawa, Kaoru
2 Mizuki, Takaaki
2 Ohata, Satsuya
2 Omote, Kazumasa
2 Santoso, Bagus
2 Watanabe, Yuji
1 Akiyama, Koichiro
1 Cramer, Ronald John Fitzgerald
1 Fujii, Arisa
1 Fujisaki, Eiichiro
1 Galindo, David
1 Gohshi, Seiichi
1 Gomi, Takeshi
1 Goto, Yasuhiro
1 Hashimoto, Yuji
1 Hasuo, Ichiro
1 Hirano, Takato
1 Hofheinz, Dennis
1 Inamura, Masaki
1 Iwata, Tetsu
1 Izu, Tetsuya
1 Kashiwabara, Kenji
1 Katsumata, Shuichi
1 Kiltz, Eike
1 Kitada, Wataru
1 Kitajima, Nobuaki
1 Kodate, Akihisa
1 Komaki, Hirotaka
1 Majima, Keigo
1 Matsumoto, Tsutomu
1 Maurer, Ueli M.
1 Morita, Hiraku
1 Murota, Itsuro
1 Nakagawa, Sanami
1 Namba, Seiichi
1 Nishigaki, Masakatsu
1 Nojiri, Daisuke
1 Okumura, Shinya
1 Oyamada, Kimiyuki
1 Pass, Rafael
1 Phan, Thi Lan Anh
1 Sakai, Ryuichi
1 Sakemi, Yumi
1 Sakiyama, Kazuo
1 Shelat, Abhi
1 Shimizu, Kana
1 Takagi, Tsuyoshi
1 Takenaka, Masahiko
1 Vaikuntanathan, Vinod
1 Watanabe, Yodai
1 Winter, Andreas
...and 5 more Co-Authors

Publications by Year

Citations contained in zbMATH

68 Publications have been cited 208 times in 153 Documents Cited by Year
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070
Hanaoka, Goichiro; Kurosawa, Kaoru
13
2008
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
12
2007
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
12
2006
A framework for identity-based encryption with almost tight security. Zbl 1380.94069
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
10
2015
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
8
2015
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
8
2005
Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei
7
2012
Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
7
2011
A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
6
2014
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Group signatures with message-dependent opening. Zbl 1305.94092
Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa
5
2013
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo
5
2012
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
5
2000
Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076
Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro
4
2016
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
4
2014
Chosen ciphertext security via UCE. Zbl 1335.94068
Matsuda, Takahiro; Hanaoka, Goichiro
4
2014
On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N.
4
2012
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
4
2002
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Attribute-based encryption for range attributes. Zbl 1400.94114
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota
3
2016
On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu
3
2016
Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2012
On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167
Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro
3
2011
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062
Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro
2
2018
Secure grouping protocol using a deck of cards. Zbl 1417.94062
Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro
2
2017
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
2
2017
Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032
Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota
2
2016
On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064
Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
2
2015
Chosen ciphertext security via point obfuscation. Zbl 1317.94122
Matsuda, Takahiro; Hanaoka, Goichiro
2
2014
Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066
Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota
2
2013
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125
Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya
2
2012
Generic constructions of parallel key-insulated encryption. Zbl 1286.68112
Hanaoka, Goichiro; Weng, Jian
2
2010
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
2002
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204
Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2018
Towards user-friendly cryptography. Zbl 1410.94080
Hanaoka, Goichiro
1
2017
Group signature with deniability: how to disavow a signature. Zbl 1398.94197
Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke
1
2016
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160
Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji
1
2016
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159
Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2016
Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135
Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru
1
2016
A signature scheme with a fuzzy private key. Zbl 1348.94073
Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu
1
2015
Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji
1
2015
Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo
1
2015
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616
Matsuda, Takahiro; Hanaoka, Goichiro
1
2015
More constructions of re-splittable threshold public key encryption. Zbl 1417.94079
Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta
1
2014
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070
Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru
1
2014
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037
Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke
1
2014
All-but-one dual projective hashing and its applications. Zbl 1353.94079
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei
1
2014
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560
Nuida, Koji; Hanaoka, Goichiro
1
2013
Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki
1
2013
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru
1
2012
Space efficient signature schemes from the RSA assumption. Zbl 1252.94116
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
1
2012
Applications of signcryption. Zbl 1217.68084
Cui, Yang; Hanaoka, Goichiro
1
2010
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061
Nuida, Koji; Hanaoka, Goichiro
1
2010
Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110
Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro
1
2010
Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki
1
2008
An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114
Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto
1
2008
Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379
Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
1
2007
Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130
Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki
1
2006
A short random fingerprinting code against a small number of pirates. Zbl 1125.94042
Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki
1
2006
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki
1
2002
Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521
Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
1
2001
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062
Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro
2
2018
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204
Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2018
Secure grouping protocol using a deck of cards. Zbl 1417.94062
Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro
2
2017
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
2
2017
Towards user-friendly cryptography. Zbl 1410.94080
Hanaoka, Goichiro
1
2017
Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076
Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro
4
2016
Attribute-based encryption for range attributes. Zbl 1400.94114
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota
3
2016
On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu
3
2016
Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032
Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota
2
2016
On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064
Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
Group signature with deniability: how to disavow a signature. Zbl 1398.94197
Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke
1
2016
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160
Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji
1
2016
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159
Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2016
Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135
Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru
1
2016
A framework for identity-based encryption with almost tight security. Zbl 1380.94069
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
10
2015
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
8
2015
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
2
2015
A signature scheme with a fuzzy private key. Zbl 1348.94073
Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu
1
2015
Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji
1
2015
Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo
1
2015
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616
Matsuda, Takahiro; Hanaoka, Goichiro
1
2015
A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
6
2014
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
4
2014
Chosen ciphertext security via UCE. Zbl 1335.94068
Matsuda, Takahiro; Hanaoka, Goichiro
4
2014
Chosen ciphertext security via point obfuscation. Zbl 1317.94122
Matsuda, Takahiro; Hanaoka, Goichiro
2
2014
More constructions of re-splittable threshold public key encryption. Zbl 1417.94079
Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta
1
2014
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070
Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru
1
2014
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037
Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke
1
2014
All-but-one dual projective hashing and its applications. Zbl 1353.94079
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei
1
2014
Group signatures with message-dependent opening. Zbl 1305.94092
Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa
5
2013
Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066
Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota
2
2013
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560
Nuida, Koji; Hanaoka, Goichiro
1
2013
Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki
1
2013
Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei
7
2012
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo
5
2012
On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N.
4
2012
Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2012
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125
Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya
2
2012
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru
1
2012
Space efficient signature schemes from the RSA assumption. Zbl 1252.94116
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
1
2012
Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
7
2011
On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167
Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro
3
2011
Generic constructions of parallel key-insulated encryption. Zbl 1286.68112
Hanaoka, Goichiro; Weng, Jian
2
2010
Applications of signcryption. Zbl 1217.68084
Cui, Yang; Hanaoka, Goichiro
1
2010
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061
Nuida, Koji; Hanaoka, Goichiro
1
2010
Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110
Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro
1
2010
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070
Hanaoka, Goichiro; Kurosawa, Kaoru
13
2008
Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki
1
2008
An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114
Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto
1
2008
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
12
2007
Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379
Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
1
2007
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
12
2006
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130
Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki
1
2006
A short random fingerprinting code against a small number of pirates. Zbl 1125.94042
Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki
1
2006
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
8
2005
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
4
2002
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
2002
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki
1
2002
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521
Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
1
2001
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
5
2000
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
all top 5

Cited by 328 Authors

16 Hanaoka, Goichiro
7 Yamada, Shota
6 Hofheinz, Dennis
6 Kunihiro, Noboru
6 Libert, Benoît
6 Matsuda, Takahiro
6 Park, Jonghwan
5 Kiltz, Eike
5 Nuida, Koji
5 Shikata, Junji
5 Weng, Jian
4 Attrapadung, Nuttapong
4 Emura, Keita
4 Lee, Dong Hoon
4 Long, Yu
4 Susilo, Willy
4 Venturi, Daniele
4 Watanabe, Yodai
3 Abdalla, Michel
3 Bellare, Mihir
3 Catalano, Dario
3 Chase, Melissa
3 Chen, Jie
3 Choi, Seung Geol
3 Dodis, Yevgeniy
3 Farshim, Pooya
3 Fiore, Dario
3 Ghadafi, Essam M.
3 Groth, Jens
3 Imai, Hideki
3 Lee, Kwangsu
3 Ling, San
3 Liu, Shengli
3 Nandi, Mridul
3 Nguyen, Khoa
3 Pandit, Tapas
3 Paterson, Kenneth G.
3 Wan, Zhongmei
3 Yamakawa, Takashi
3 Yung, Moti
2 Abe, Takuro
2 Agrawal, Shashank
2 Albrecht, Martin R.
2 Biagioni, Silvio
2 Boneh, Dan
2 Bootle, Jonathan
2 Cash, David M.
2 Cerulli, Andrea
2 Chaidos, Pyrros
2 Chen, Jianhong
2 Chen, Kefei
2 Chen, Yu
2 Coretti, Sandro
2 Dachman-Soled, Dana
2 Deng, Robert Huijie
2 Dobrovol’skiĭ, Nikolaĭ Mikhaĭlovich
2 Dobrovol’skiĭ, Nikolai Nikolaevich
2 Dutta, Ratna
2 Gong, Junqing
2 Guo, Fuchun
2 Han, Shuai
2 Hao, Rong
2 Hong, Xuan
2 Jia, Dingding
2 Kaji, Shizuo
2 Kawai, Yutaka
2 Lai, Junzuo
2 Lai, Xuejia
2 Larraia, Enrique
2 Lee, Donghoon
2 Li, Bao
2 Li, Jiguo
2 Lu, Yang
2 Maeno, Toshiaki
2 Malkin, Tal G.
2 Masny, Daniel
2 Matsumoto, Tsutomu
2 Matsuura, Kanta
2 Miyahara, Daiki
2 Mizuki, Takaaki
2 Mouhartem, Fabrice
2 Mu, Yi
2 Nizzardo, Luca
2 Numata, Yasuhide
2 Ogawa, Kazuto
2 Ohtake, Go
2 Peters, Thomas J.
2 Phan Duong Hieu
2 Ràfols, Carla
2 Seo, Jae Hong
2 Shoup, Victor
2 Sone, Hideaki
2 Stepanovs, Igors
2 Tackmann, Björn
2 Tanaka, Keisuke
2 Tessaro, Stefano
2 Tibouchi, Mehdi
2 Trinh, Viet Cuong
2 Wang, Huaxiong
2 Watanabe, Hajime
...and 228 more Authors

Citations by Year