Edit Profile (opens in new tab) Hanaoka, Goichiro Compute Distance To: Compute Author ID: hanaoka.goichiro Published as: Hanaoka, Goichiro External Links: ORCID Documents Indexed: 127 Publications since 1998 3 Contributions as Editor Co-Authors: 105 Co-Authors with 128 Joint Publications 1,786 Co-Co-Authors all top 5 Co-Authors 2 single-authored 41 Imai, Hideki 33 Matsuda, Takahiro 18 Yamada, Shota 17 Attrapadung, Nuttapong 13 Kunihiro, Noboru 12 Emura, Keita 12 Sakai, Yusuke 12 Tanaka, Keisuke 11 Nuida, Koji 11 Shikata, Junji 10 Matsuura, Kanta 10 Schuldt, Jacob C. N. 9 Zhang, Rui 8 Ohtake, Go 8 Zheng, Yuliang 7 Hanaoka, Yumiko 7 Ogawa, Kazuto 7 Yamakawa, Takashi 6 Kawai, Yutaka 6 Kitagawa, Fuyuki 5 Nishide, Takashi 5 Okamoto, Eiji 4 Nishioka, Tsuyoshi 4 Ohta, Kazuo 4 Shinagawa, Kazumasa 4 Wang, Yuyu 4 Zhao, Yunlei 3 Cui, Yang 3 Hara, Keisuke 3 Müller-Quade, Jörn 3 Murakami, Takao 3 Nascimento, Anderson C. A. 3 Otsuka, Akira 3 Takahashi, Kenta 3 Teruya, Tadanori 3 Watanabe, Hajime 3 Weng, Jian 3 Yang, Peng 3 Zhang, Zongyang 2 Cao, Zhenfu 2 Chen, Yu 2 Chow, Sherman S. M. 2 Furukawa, Jun 2 Hagiwara, Manabu 2 Ishida, Ai 2 Kanayama, Naoki 2 Kasamatsu, Kohei 2 Kitagawa, Takashi 2 Koseki, Yoshihiro 2 Kurosawa, Kaoru 2 Mizuki, Takaaki 2 Ohata, Satsuya 2 Omote, Kazumasa 2 Santoso, Bagus 2 Watanabe, Yodai 2 Watanabe, Yuji 1 Akiyama, Koichiro 1 Cramer, Ronald John Fitzgerald 1 Fujii, Arisa 1 Fujisaki, Eiichiro 1 Galindo, David 1 Gohshi, Seiichi 1 Gomi, Takeshi 1 Goto, Yasuhiro 1 Hashimoto, Yuji 1 Hasuo, Ichiro 1 Hirano, Takato 1 Hofheinz, Dennis 1 Inamura, Masaki 1 Iwata, Tetsu 1 Izu, Tetsuya 1 Kashiwabara, Kenji 1 Katsumata, Shuichi 1 Kiltz, Eike 1 Kitada, Wataru 1 Kitajima, Nobuaki 1 Kodate, Akihisa 1 Komaki, Hirotaka 1 Majima, Keigo 1 Matsumoto, Tsutomu 1 Maurer, Ueli M. 1 Morita, Hiraku 1 Murota, Itsuro 1 Nakagawa, Sanami 1 Namba, Seiichi 1 Nishigaki, Masakatsu 1 Nojiri, Daisuke 1 Okumura, Shinya 1 Oyamada, Kimiyuki 1 Pass, Rafael 1 Phan, Thi Lan Anh 1 Sakai, Ryuichi 1 Sakemi, Yumi 1 Sakiyama, Kazuo 1 Shelat, Abhi 1 Shimizu, Kana 1 Takagi, Tsuyoshi 1 Takenaka, Masahiko 1 Vaikuntanathan, Vinod 1 Winter, Andreas ...and 5 more Co-Authors all top 5 Serials 3 Theoretical Computer Science 3 Lecture Notes in Computer Science 2 IEEE Transactions on Information Theory 2 Designs, Codes and Cryptography 1 The Computer Journal. Section A / Section B 1 Algorithmica 1 International Journal of Applied Cryptography all top 5 Fields 127 Information and communication theory, circuits (94-XX) 30 Computer science (68-XX) 4 General and overarching topics; collections (00-XX) 3 Number theory (11-XX) 2 Numerical analysis (65-XX) 1 Algebraic geometry (14-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 71 Publications have been cited 259 times in 195 Documents Cited by ▼ Year ▼ Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070Hanaoka, Goichiro; Kurosawa, Kaoru 14 2008 A framework for identity-based encryption with almost tight security. Zbl 1380.94069Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 13 2015 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 13 2006 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 13 2007 Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 13 2011 Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 10 2015 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 10 2005 Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei 9 2012 Group signatures with message-dependent opening. Zbl 1305.94092Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa 8 2013 A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 7 2014 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 6 2000 Chosen ciphertext security via UCE. Zbl 1335.94068Matsuda, Takahiro; Hanaoka, Goichiro 5 2014 Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro 5 2016 On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo 5 2012 On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. 5 2012 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro 5 2018 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Secure grouping protocol using a deck of cards. Zbl 1417.94062Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro 4 2017 Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru 4 2012 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 4 2014 Memory lower bounds of reductions revisited. Zbl 1423.94113Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 4 2018 Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji 3 2015 Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616Matsuda, Takahiro; Hanaoka, Goichiro 3 2015 On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu 3 2016 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 3 2002 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2002 Attribute-based encryption for range attributes. Zbl 1400.94114Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota 3 2016 Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2012 Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya 3 2012 On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro 3 2011 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2017 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki 2 2008 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2018 Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota 2 2013 New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 2 2015 How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 Generic constructions of parallel key-insulated encryption. Zbl 1286.68112Hanaoka, Goichiro; Weng, Jian 2 2010 Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota 2 2016 Chosen ciphertext security via point obfuscation. Zbl 1317.94122Matsuda, Takahiro; Hanaoka, Goichiro 2 2014 Space efficient signature schemes from the RSA assumption. Zbl 1252.94116Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 2 2012 A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke 2 2014 Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo 1 2015 A signature scheme with a fuzzy private key. Zbl 1348.94073Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu 1 2015 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560Nuida, Koji; Hanaoka, Goichiro 1 2013 More constructions of re-splittable threshold public key encryption. Zbl 1417.94079Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta 1 2014 Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru 1 2016 A short random fingerprinting code against a small number of pirates. Zbl 1125.94042Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki 1 2006 Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro 1 2010 A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki 1 2002 Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 1 2001 Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 1 2007 An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto 1 2008 Group signature with deniability: how to disavow a signature. Zbl 1398.94197Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke 1 2016 Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji 1 2016 Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru 1 2014 Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Zbl 1258.94004 1 2013 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061Nuida, Koji; Hanaoka, Goichiro 1 2010 Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki 1 2013 Signatures resilient to uninvertible leakage. Zbl 1482.94073Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2016 All-but-one dual projective hashing and its applications. Zbl 1353.94079Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2014 Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki 1 2006 Applications of signcryption. Zbl 1217.68084Cui, Yang; Hanaoka, Goichiro 1 2010 Towards user-friendly cryptography. Zbl 1410.94080Hanaoka, Goichiro 1 2017 Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro 5 2018 Memory lower bounds of reductions revisited. Zbl 1423.94113Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 4 2018 Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2018 Secure grouping protocol using a deck of cards. Zbl 1417.94062Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro 4 2017 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2017 Towards user-friendly cryptography. Zbl 1410.94080Hanaoka, Goichiro 1 2017 Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro 5 2016 On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu 3 2016 Attribute-based encryption for range attributes. Zbl 1400.94114Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota 3 2016 On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota 2 2016 Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru 1 2016 Group signature with deniability: how to disavow a signature. Zbl 1398.94197Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke 1 2016 Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji 1 2016 Signatures resilient to uninvertible leakage. Zbl 1482.94073Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2016 A framework for identity-based encryption with almost tight security. Zbl 1380.94069Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 13 2015 Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 10 2015 Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji 3 2015 Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616Matsuda, Takahiro; Hanaoka, Goichiro 3 2015 New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 2 2015 Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo 1 2015 A signature scheme with a fuzzy private key. Zbl 1348.94073Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu 1 2015 A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 7 2014 Chosen ciphertext security via UCE. Zbl 1335.94068Matsuda, Takahiro; Hanaoka, Goichiro 5 2014 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 4 2014 Chosen ciphertext security via point obfuscation. Zbl 1317.94122Matsuda, Takahiro; Hanaoka, Goichiro 2 2014 A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke 2 2014 More constructions of re-splittable threshold public key encryption. Zbl 1417.94079Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta 1 2014 Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru 1 2014 All-but-one dual projective hashing and its applications. Zbl 1353.94079Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2014 Group signatures with message-dependent opening. Zbl 1305.94092Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa 8 2013 Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota 2 2013 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560Nuida, Koji; Hanaoka, Goichiro 1 2013 Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Zbl 1258.94004 1 2013 Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki 1 2013 Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei 9 2012 On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo 5 2012 On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. 5 2012 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru 4 2012 Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2012 Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya 3 2012 Space efficient signature schemes from the RSA assumption. Zbl 1252.94116Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 2 2012 Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 13 2011 On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro 3 2011 Generic constructions of parallel key-insulated encryption. Zbl 1286.68112Hanaoka, Goichiro; Weng, Jian 2 2010 Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro 1 2010 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061Nuida, Koji; Hanaoka, Goichiro 1 2010 Applications of signcryption. Zbl 1217.68084Cui, Yang; Hanaoka, Goichiro 1 2010 Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070Hanaoka, Goichiro; Kurosawa, Kaoru 14 2008 Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki 2 2008 An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto 1 2008 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 13 2007 Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 1 2007 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 13 2006 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 A short random fingerprinting code against a small number of pirates. Zbl 1125.94042Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki 1 2006 Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki 1 2006 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 10 2005 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 3 2002 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2002 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki 1 2002 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 1 2001 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 6 2000 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 all cited Publications top 5 cited Publications all top 5 Cited by 379 Authors 19 Hanaoka, Goichiro 10 Matsuda, Takahiro 8 Libert, Benoît 8 Yamada, Shota 6 Hofheinz, Dennis 6 Kunihiro, Noboru 6 Park, Jonghwan 6 Tanaka, Keisuke 5 Emura, Keita 5 Kiltz, Eike 5 Nuida, Koji 5 Shikata, Junji 5 Venturi, Daniele 5 Watanabe, Yodai 5 Weng, Jian 4 Attrapadung, Nuttapong 4 Chen, Jie 4 Groth, Jens 4 Long, Yu 4 Nandi, Mridul 4 Nguyen, Khoa 4 Pandit, Tapas 4 Susilo, Willy 4 Yamakawa, Takashi 4 Yung, Moti 3 Abdalla, Michel 3 Albrecht, Martin R. 3 Bellare, Mihir 3 Bootle, Jonathan 3 Cash, David M. 3 Catalano, Dario 3 Cerulli, Andrea 3 Chase, Melissa 3 Choi, Seung Geol 3 Coretti, Sandro 3 Dodis, Yevgeniy 3 Ducas, Léo 3 Farshim, Pooya 3 Fiore, Dario 3 Ghadafi, Essam M. 3 Gong, Junqing 3 Imai, Hideki 3 Jia, Dingding 3 Lee, Kwangsu 3 Ling, San 3 Liu, Shengli 3 Maller, Mary 3 Miyahara, Daiki 3 Mizuki, Takaaki 3 Paterson, Kenneth G. 3 Seo, Jae Hong 3 Sone, Hideaki 3 Tessaro, Stefano 3 Wan, Zhongmei 3 Waters, Brent 2 Abe, Takuro 2 Agrawal, Shashank 2 Biagioni, Silvio 2 Boneh, Dan 2 Chaidos, Pyrros 2 Chen, Jianhong 2 Chen, Kefei 2 Chen, Yu 2 Dachman-Soled, Dana 2 Deng, Robert Huijie 2 Derler, David 2 Dobrovol’skiĭ, Nikolaĭ Mikhaĭlovich 2 Dobrovol’skiĭ, Nikolai Nikolaevich 2 Dutta, Ratna 2 Guo, Fuchun 2 Han, Shuai 2 Hao, Rong 2 Hara, Keisuke 2 Hong, Xuan 2 Itoh, Toshiya 2 Jager, Tibor 2 Kaji, Shizuo 2 Kawai, Yutaka 2 Kitagawa, Fuyuki 2 Lai, Junzuo 2 Lai, Xuejia 2 Larraia, Enrique 2 Li, Bao 2 Li, Jiguo 2 Lu, Yang 2 Maeno, Toshiaki 2 Malkin, Tal G. 2 Masny, Daniel 2 Matsumoto, Tsutomu 2 Matsuura, Kanta 2 Maurer, Ueli M. 2 Meiklejohn, Sarah 2 Mouhartem, Fabrice 2 Mu, Yi 2 Nishimaki, Ryo 2 Nizzardo, Luca 2 Numata, Yasuhide 2 Ogawa, Kazuto 2 Ohtake, Go 2 O’Neill, Adam ...and 279 more Authors all top 5 Cited in 25 Serials 25 Designs, Codes and Cryptography 23 Theoretical Computer Science 18 Journal of Cryptology 8 Information Sciences 4 Journal of Mathematical Cryptology 3 Information Processing Letters 3 Algorithmica 3 Journal of Discrete Mathematical Sciences & Cryptography 3 Journal of Shanghai Jiaotong University (Science) 3 Advances in Mathematics of Communications 2 Journal of Computer and System Sciences 2 International Journal of Foundations of Computer Science 2 Quantum Information Processing 2 Chebyshevskiĭ Sbornik 1 Discrete Applied Mathematics 1 IEEE Transactions on Information Theory 1 Physica A 1 Mathematical and Computer Modelling 1 International Journal of Computer Mathematics 1 Applicable Algebra in Engineering, Communication and Computing 1 Mathematical Problems in Engineering 1 Soft Computing 1 Journal of Zhejiang University. Science A 1 Science China. Information Sciences 1 Frontiers of Computer Science all top 5 Cited in 10 Fields 185 Information and communication theory, circuits (94-XX) 40 Computer science (68-XX) 9 Number theory (11-XX) 4 Quantum theory (81-XX) 3 Algebraic geometry (14-XX) 2 Numerical analysis (65-XX) 1 Combinatorics (05-XX) 1 General algebraic systems (08-XX) 1 Commutative algebra (13-XX) 1 Statistical mechanics, structure of matter (82-XX) Citations by Year