×
Compute Distance To:
Author ID: hanaoka.goichiro Recent zbMATH articles by "Hanaoka, Goichiro"
Published as: Hanaoka, Goichiro
External Links: ORCID
all top 5

Co-Authors

2 single-authored
41 Imai, Hideki
33 Matsuda, Takahiro
18 Yamada, Shota
17 Attrapadung, Nuttapong
13 Kunihiro, Noboru
12 Emura, Keita
12 Sakai, Yusuke
12 Tanaka, Keisuke
11 Nuida, Koji
11 Shikata, Junji
10 Matsuura, Kanta
10 Schuldt, Jacob C. N.
9 Zhang, Rui
8 Ohtake, Go
8 Zheng, Yuliang
7 Hanaoka, Yumiko
7 Ogawa, Kazuto
7 Yamakawa, Takashi
6 Kawai, Yutaka
6 Kitagawa, Fuyuki
5 Nishide, Takashi
5 Okamoto, Eiji
4 Nishioka, Tsuyoshi
4 Ohta, Kazuo
4 Shinagawa, Kazumasa
4 Wang, Yuyu
4 Zhao, Yunlei
3 Cui, Yang
3 Hara, Keisuke
3 Müller-Quade, Jörn
3 Murakami, Takao
3 Nascimento, Anderson C. A.
3 Otsuka, Akira
3 Takahashi, Kenta
3 Teruya, Tadanori
3 Watanabe, Hajime
3 Weng, Jian
3 Yang, Peng
3 Zhang, Zongyang
2 Cao, Zhenfu
2 Chen, Yu
2 Chow, Sherman S. M.
2 Furukawa, Jun
2 Hagiwara, Manabu
2 Ishida, Ai
2 Kanayama, Naoki
2 Kasamatsu, Kohei
2 Kitagawa, Takashi
2 Koseki, Yoshihiro
2 Kurosawa, Kaoru
2 Mizuki, Takaaki
2 Ohata, Satsuya
2 Omote, Kazumasa
2 Santoso, Bagus
2 Watanabe, Yodai
2 Watanabe, Yuji
1 Akiyama, Koichiro
1 Cramer, Ronald John Fitzgerald
1 Fujii, Arisa
1 Fujisaki, Eiichiro
1 Galindo, David
1 Gohshi, Seiichi
1 Gomi, Takeshi
1 Goto, Yasuhiro
1 Hashimoto, Yuji
1 Hasuo, Ichiro
1 Hirano, Takato
1 Hofheinz, Dennis
1 Inamura, Masaki
1 Iwata, Tetsu
1 Izu, Tetsuya
1 Kashiwabara, Kenji
1 Katsumata, Shuichi
1 Kiltz, Eike
1 Kitada, Wataru
1 Kitajima, Nobuaki
1 Kodate, Akihisa
1 Komaki, Hirotaka
1 Majima, Keigo
1 Matsumoto, Tsutomu
1 Maurer, Ueli M.
1 Morita, Hiraku
1 Murota, Itsuro
1 Nakagawa, Sanami
1 Namba, Seiichi
1 Nishigaki, Masakatsu
1 Nojiri, Daisuke
1 Okumura, Shinya
1 Oyamada, Kimiyuki
1 Pass, Rafael
1 Phan, Thi Lan Anh
1 Sakai, Ryuichi
1 Sakemi, Yumi
1 Sakiyama, Kazuo
1 Shelat, Abhi
1 Shimizu, Kana
1 Takagi, Tsuyoshi
1 Takenaka, Masahiko
1 Vaikuntanathan, Vinod
1 Winter, Andreas
...and 5 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

71 Publications have been cited 259 times in 195 Documents Cited by Year
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070
Hanaoka, Goichiro; Kurosawa, Kaoru
14
2008
A framework for identity-based encryption with almost tight security. Zbl 1380.94069
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
13
2015
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
13
2006
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
13
2007
Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
13
2011
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
10
2015
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
10
2005
Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei
9
2012
Group signatures with message-dependent opening. Zbl 1305.94092
Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa
8
2013
A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
7
2014
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
6
2000
Chosen ciphertext security via UCE. Zbl 1335.94068
Matsuda, Takahiro; Hanaoka, Goichiro
5
2014
Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076
Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro
5
2016
On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo
5
2012
On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N.
5
2012
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062
Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro
5
2018
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Secure grouping protocol using a deck of cards. Zbl 1417.94062
Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro
4
2017
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru
4
2012
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
4
2014
Memory lower bounds of reductions revisited. Zbl 1423.94113
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
4
2018
Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji
3
2015
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616
Matsuda, Takahiro; Hanaoka, Goichiro
3
2015
On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu
3
2016
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
3
2002
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2002
Attribute-based encryption for range attributes. Zbl 1400.94114
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota
3
2016
Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2012
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125
Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya
3
2012
On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167
Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro
3
2011
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2017
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064
Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki
2
2008
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204
Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2018
Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066
Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota
2
2013
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
2
2015
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159
Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
Generic constructions of parallel key-insulated encryption. Zbl 1286.68112
Hanaoka, Goichiro; Weng, Jian
2
2010
Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032
Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota
2
2016
Chosen ciphertext security via point obfuscation. Zbl 1317.94122
Matsuda, Takahiro; Hanaoka, Goichiro
2
2014
Space efficient signature schemes from the RSA assumption. Zbl 1252.94116
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
2
2012
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037
Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke
2
2014
Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo
1
2015
A signature scheme with a fuzzy private key. Zbl 1348.94073
Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu
1
2015
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560
Nuida, Koji; Hanaoka, Goichiro
1
2013
More constructions of re-splittable threshold public key encryption. Zbl 1417.94079
Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta
1
2014
Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135
Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru
1
2016
A short random fingerprinting code against a small number of pirates. Zbl 1125.94042
Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki
1
2006
Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110
Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro
1
2010
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki
1
2002
Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521
Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
1
2001
Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379
Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
1
2007
An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114
Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto
1
2008
Group signature with deniability: how to disavow a signature. Zbl 1398.94197
Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke
1
2016
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160
Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji
1
2016
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070
Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru
1
2014
Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Zbl 1258.94004
1
2013
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061
Nuida, Koji; Hanaoka, Goichiro
1
2010
Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki
1
2013
Signatures resilient to uninvertible leakage. Zbl 1482.94073
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2016
All-but-one dual projective hashing and its applications. Zbl 1353.94079
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei
1
2014
Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130
Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki
1
2006
Applications of signcryption. Zbl 1217.68084
Cui, Yang; Hanaoka, Goichiro
1
2010
Towards user-friendly cryptography. Zbl 1410.94080
Hanaoka, Goichiro
1
2017
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062
Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro
5
2018
Memory lower bounds of reductions revisited. Zbl 1423.94113
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
4
2018
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204
Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2018
Secure grouping protocol using a deck of cards. Zbl 1417.94062
Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro
4
2017
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2017
Towards user-friendly cryptography. Zbl 1410.94080
Hanaoka, Goichiro
1
2017
Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076
Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro
5
2016
On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu
3
2016
Attribute-based encryption for range attributes. Zbl 1400.94114
Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota
3
2016
On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064
Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159
Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
2
2016
Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032
Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota
2
2016
Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135
Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru
1
2016
Group signature with deniability: how to disavow a signature. Zbl 1398.94197
Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke
1
2016
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160
Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji
1
2016
Signatures resilient to uninvertible leakage. Zbl 1482.94073
Wang, Yuyu; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke
1
2016
A framework for identity-based encryption with almost tight security. Zbl 1380.94069
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
13
2015
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
10
2015
Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji
3
2015
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616
Matsuda, Takahiro; Hanaoka, Goichiro
3
2015
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474
Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota
2
2015
Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo
1
2015
A signature scheme with a fuzzy private key. Zbl 1348.94073
Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu
1
2015
A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
7
2014
Chosen ciphertext security via UCE. Zbl 1335.94068
Matsuda, Takahiro; Hanaoka, Goichiro
5
2014
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
4
2014
Chosen ciphertext security via point obfuscation. Zbl 1317.94122
Matsuda, Takahiro; Hanaoka, Goichiro
2
2014
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037
Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke
2
2014
More constructions of re-splittable threshold public key encryption. Zbl 1417.94079
Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta
1
2014
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070
Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru
1
2014
All-but-one dual projective hashing and its applications. Zbl 1353.94079
Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei
1
2014
Group signatures with message-dependent opening. Zbl 1305.94092
Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa
8
2013
Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066
Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota
2
2013
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560
Nuida, Koji; Hanaoka, Goichiro
1
2013
Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Zbl 1258.94004
1
2013
Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073
Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki
1
2013
Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei
9
2012
On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo
5
2012
On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N.
5
2012
Time-specific encryption from forward-secure encryption. Zbl 1310.94154
Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki
5
2012
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru
4
2012
Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
3
2012
Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125
Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya
3
2012
Space efficient signature schemes from the RSA assumption. Zbl 1252.94116
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
2
2012
Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
13
2011
On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167
Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro
3
2011
Generic constructions of parallel key-insulated encryption. Zbl 1286.68112
Hanaoka, Goichiro; Weng, Jian
2
2010
Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110
Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro
1
2010
On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061
Nuida, Koji; Hanaoka, Goichiro
1
2010
Applications of signcryption. Zbl 1217.68084
Cui, Yang; Hanaoka, Goichiro
1
2010
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070
Hanaoka, Goichiro; Kurosawa, Kaoru
14
2008
Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346
Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki
2
2008
An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114
Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto
1
2008
Bounded CCA2-secure encryption. Zbl 1153.94363
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod
13
2007
Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379
Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
1
2007
Parallel key-insulated public key encryption. Zbl 1151.94515
Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki
13
2006
Efficient identity-based encryption with tight security reduction. Zbl 1307.94034
Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui
6
2006
Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047
Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki
3
2006
Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029
Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki
3
2006
A short random fingerprinting code against a small number of pirates. Zbl 1125.94042
Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki
1
2006
Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130
Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki
1
2006
Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
10
2005
On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140
Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2004
Security notions for unconditionally secure signature schemes. Zbl 1056.94523
Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
3
2002
Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553
Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki
3
2002
Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550
Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki
2
2002
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038
Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki
1
2002
Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051
Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
4
2001
Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521
Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki
1
2001
Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki
6
2000
LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056
Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki
2
1998
all top 5

Cited by 379 Authors

19 Hanaoka, Goichiro
10 Matsuda, Takahiro
8 Libert, Benoît
8 Yamada, Shota
6 Hofheinz, Dennis
6 Kunihiro, Noboru
6 Park, Jonghwan
6 Tanaka, Keisuke
5 Emura, Keita
5 Kiltz, Eike
5 Nuida, Koji
5 Shikata, Junji
5 Venturi, Daniele
5 Watanabe, Yodai
5 Weng, Jian
4 Attrapadung, Nuttapong
4 Chen, Jie
4 Groth, Jens
4 Long, Yu
4 Nandi, Mridul
4 Nguyen, Khoa
4 Pandit, Tapas
4 Susilo, Willy
4 Yamakawa, Takashi
4 Yung, Moti
3 Abdalla, Michel
3 Albrecht, Martin R.
3 Bellare, Mihir
3 Bootle, Jonathan
3 Cash, David M.
3 Catalano, Dario
3 Cerulli, Andrea
3 Chase, Melissa
3 Choi, Seung Geol
3 Coretti, Sandro
3 Dodis, Yevgeniy
3 Ducas, Léo
3 Farshim, Pooya
3 Fiore, Dario
3 Ghadafi, Essam M.
3 Gong, Junqing
3 Imai, Hideki
3 Jia, Dingding
3 Lee, Kwangsu
3 Ling, San
3 Liu, Shengli
3 Maller, Mary
3 Miyahara, Daiki
3 Mizuki, Takaaki
3 Paterson, Kenneth G.
3 Seo, Jae Hong
3 Sone, Hideaki
3 Tessaro, Stefano
3 Wan, Zhongmei
3 Waters, Brent
2 Abe, Takuro
2 Agrawal, Shashank
2 Biagioni, Silvio
2 Boneh, Dan
2 Chaidos, Pyrros
2 Chen, Jianhong
2 Chen, Kefei
2 Chen, Yu
2 Dachman-Soled, Dana
2 Deng, Robert Huijie
2 Derler, David
2 Dobrovol’skiĭ, Nikolaĭ Mikhaĭlovich
2 Dobrovol’skiĭ, Nikolai Nikolaevich
2 Dutta, Ratna
2 Guo, Fuchun
2 Han, Shuai
2 Hao, Rong
2 Hara, Keisuke
2 Hong, Xuan
2 Itoh, Toshiya
2 Jager, Tibor
2 Kaji, Shizuo
2 Kawai, Yutaka
2 Kitagawa, Fuyuki
2 Lai, Junzuo
2 Lai, Xuejia
2 Larraia, Enrique
2 Li, Bao
2 Li, Jiguo
2 Lu, Yang
2 Maeno, Toshiaki
2 Malkin, Tal G.
2 Masny, Daniel
2 Matsumoto, Tsutomu
2 Matsuura, Kanta
2 Maurer, Ueli M.
2 Meiklejohn, Sarah
2 Mouhartem, Fabrice
2 Mu, Yi
2 Nishimaki, Ryo
2 Nizzardo, Luca
2 Numata, Yasuhide
2 Ogawa, Kazuto
2 Ohtake, Go
2 O’Neill, Adam
...and 279 more Authors

Citations by Year