Edit Profile Hanaoka, Goichiro Compute Distance To: Compute Author ID: hanaoka.goichiro Published as: Hanaoka, Goichiro External Links: ORCID Documents Indexed: 127 Publications since 1998, including 2 Books all top 5 Co-Authors 2 single-authored 41 Imai, Hideki 31 Matsuda, Takahiro 18 Yamada, Shota 17 Attrapadung, Nuttapong 13 Kunihiro, Noboru 12 Emura, Keita 12 Sakai, Yusuke 11 Nuida, Koji 10 Matsuura, Kanta 10 Schuldt, Jacob C. N. 10 Shikata, Junji 10 Tanaka, Keisuke 9 Zhang, Rui 8 Ohtake, Go 8 Zheng, Yuliang 7 Hanaoka, Yumiko 7 Ogawa, Kazuto 7 Yamakawa, Takashi 6 Kawai, Yutaka 6 Kitagawa, Fuyuki 5 Nishide, Takashi 5 Okamoto, Eiji 4 Nishioka, Tsuyoshi 4 Ohta, Kazuo 4 Shinagawa, Kazumasa 4 Zhao, Yunlei 3 Cui, Yang 3 Müller-Quade, Jörn 3 Murakami, Takao 3 Nascimento, Anderson C. A. 3 Otsuka, Akira 3 Takahashi, Kenta 3 Teruya, Tadanori 3 Wang, Yuyu 3 Watanabe, Hajime 3 Weng, Jian 3 Yang, Peng 3 Zhang, Zongyang 2 Cao, Zhenfu 2 Chen, Yu 2 Chow, Sherman S. M. 2 Furukawa, Jun 2 Hagiwara, Manabu 2 Hara, Keisuke 2 Ishida, Ai 2 Kanayama, Naoki 2 Kasamatsu, Kohei 2 Kitagawa, Takashi 2 Koseki, Yoshihiro 2 Kurosawa, Kaoru 2 Mizuki, Takaaki 2 Ohata, Satsuya 2 Omote, Kazumasa 2 Santoso, Bagus 2 Watanabe, Yuji 1 Akiyama, Koichiro 1 Cramer, Ronald John Fitzgerald 1 Fujii, Arisa 1 Fujisaki, Eiichiro 1 Galindo, David 1 Gohshi, Seiichi 1 Gomi, Takeshi 1 Goto, Yasuhiro 1 Hashimoto, Yuji 1 Hasuo, Ichiro 1 Hirano, Takato 1 Hofheinz, Dennis 1 Inamura, Masaki 1 Iwata, Tetsu 1 Izu, Tetsuya 1 Kashiwabara, Kenji 1 Katsumata, Shuichi 1 Kiltz, Eike 1 Kitada, Wataru 1 Kitajima, Nobuaki 1 Kodate, Akihisa 1 Komaki, Hirotaka 1 Majima, Keigo 1 Matsumoto, Tsutomu 1 Maurer, Ueli M. 1 Morita, Hiraku 1 Murota, Itsuro 1 Nakagawa, Sanami 1 Namba, Seiichi 1 Nishigaki, Masakatsu 1 Nojiri, Daisuke 1 Okumura, Shinya 1 Oyamada, Kimiyuki 1 Pass, Rafael 1 Phan, Thi Lan Anh 1 Sakai, Ryuichi 1 Sakemi, Yumi 1 Sakiyama, Kazuo 1 Shelat, Abhi 1 Shimizu, Kana 1 Takagi, Tsuyoshi 1 Takenaka, Masahiko 1 Vaikuntanathan, Vinod 1 Watanabe, Yodai 1 Winter, Andreas ...and 5 more Co-Authors all top 5 Serials 3 Theoretical Computer Science 2 IEEE Transactions on Information Theory 2 Lecture Notes in Computer Science 1 The Computer Journal. Section A / Section B 1 Algorithmica 1 Designs, Codes and Cryptography 1 International Journal of Applied Cryptography all top 5 Fields 124 Information and communication theory, circuits (94-XX) 30 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 3 Number theory (11-XX) 2 Numerical analysis (65-XX) 1 Algebraic geometry (14-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 68 Publications have been cited 208 times in 153 Documents Cited by ▼ Year ▼ Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070Hanaoka, Goichiro; Kurosawa, Kaoru 13 2008 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 12 2007 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 12 2006 A framework for identity-based encryption with almost tight security. Zbl 1380.94069Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 10 2015 Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 8 2015 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 8 2005 Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei 7 2012 Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 7 2011 A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 6 2014 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Group signatures with message-dependent opening. Zbl 1305.94092Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa 5 2013 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo 5 2012 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 5 2000 Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro 4 2016 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 4 2014 Chosen ciphertext security via UCE. Zbl 1335.94068Matsuda, Takahiro; Hanaoka, Goichiro 4 2014 On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. 4 2012 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 4 2002 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Attribute-based encryption for range attributes. Zbl 1400.94114Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota 3 2016 On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu 3 2016 Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2012 On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro 3 2011 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro 2 2018 Secure grouping protocol using a deck of cards. Zbl 1417.94062Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro 2 2017 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 2 2017 Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota 2 2016 On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 2 2015 Chosen ciphertext security via point obfuscation. Zbl 1317.94122Matsuda, Takahiro; Hanaoka, Goichiro 2 2014 Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota 2 2013 Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya 2 2012 Generic constructions of parallel key-insulated encryption. Zbl 1286.68112Hanaoka, Goichiro; Weng, Jian 2 2010 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 2002 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2018 Towards user-friendly cryptography. Zbl 1410.94080Hanaoka, Goichiro 1 2017 Group signature with deniability: how to disavow a signature. Zbl 1398.94197Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke 1 2016 Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji 1 2016 How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2016 Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru 1 2016 A signature scheme with a fuzzy private key. Zbl 1348.94073Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu 1 2015 Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji 1 2015 Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo 1 2015 Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616Matsuda, Takahiro; Hanaoka, Goichiro 1 2015 More constructions of re-splittable threshold public key encryption. Zbl 1417.94079Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta 1 2014 Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru 1 2014 A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke 1 2014 All-but-one dual projective hashing and its applications. Zbl 1353.94079Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2014 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560Nuida, Koji; Hanaoka, Goichiro 1 2013 Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki 1 2013 Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru 1 2012 Space efficient signature schemes from the RSA assumption. Zbl 1252.94116Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 1 2012 Applications of signcryption. Zbl 1217.68084Cui, Yang; Hanaoka, Goichiro 1 2010 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061Nuida, Koji; Hanaoka, Goichiro 1 2010 Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro 1 2010 Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki 1 2008 An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto 1 2008 Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 1 2007 Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki 1 2006 A short random fingerprinting code against a small number of pirates. Zbl 1125.94042Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki 1 2006 A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki 1 2002 Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 1 2001 Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. Zbl 1439.94062Teruya, Tadanori; Kashiwabara, Kenji; Hanaoka, Goichiro 2 2018 Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Zbl 1448.94204Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2018 Secure grouping protocol using a deck of cards. Zbl 1417.94062Hashimoto, Yuji; Shinagawa, Kazumasa; Nuida, Koji; Inamura, Masaki; Hanaoka, Goichiro 2 2017 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1405.94091Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 2 2017 Towards user-friendly cryptography. Zbl 1410.94080Hanaoka, Goichiro 1 2017 Attribute-based signatures for circuits from bilinear map. Zbl 1388.94076Sakai, Yusuke; Attrapadung, Nuttapong; Hanaoka, Goichiro 4 2016 Attribute-based encryption for range attributes. Zbl 1400.94114Attrapadung, Nuttapong; Hanaoka, Goichiro; Ogawa, Kazuto; Ohtake, Go; Watanabe, Hajime; Yamada, Shota 3 2016 On the security of the Schnorr signature scheme and DSA against related-key attacks. Zbl 1384.94089Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu 3 2016 Attribute based encryption with direct efficiency tradeoff. Zbl 1348.94032Attrapadung, Nuttapong; Hanaoka, Goichiro; Matsumoto, Tsutomu; Teruya, Tadanori; Yamada, Shota 2 2016 On the key dependent message security of the Fujisaki-Okamoto constructions. Zbl 1388.94064Kitagawa, Fuyuki; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 2 2016 Group signature with deniability: how to disavow a signature. Zbl 1398.94197Ishida, Ai; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke; Tanaka, Keisuke 1 2016 Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Zbl 1407.94160Watanabe, Yohei; Hanaoka, Goichiro; Shikata, Junji 1 2016 How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones. Zbl 1407.94159Wang, Yuyu; Zhang, Zongyang; Matsuda, Takahiro; Hanaoka, Goichiro; Tanaka, Keisuke 1 2016 Generalized hardness assumption for self-bilinear map with auxiliary information. Zbl 1346.94135Yamakawa, Takashi; Hanaoka, Goichiro; Kunihiro, Noboru 1 2016 A framework for identity-based encryption with almost tight security. Zbl 1380.94069Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 10 2015 Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. Zbl 1380.94070Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 8 2015 New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security. Zbl 1366.94474Attrapadung, Nuttapong; Hanaoka, Goichiro; Yamada, Shota 2 2015 A signature scheme with a fuzzy private key. Zbl 1348.94073Takahashi, Kenta; Matsuda, Takahiro; Murakami, Takao; Hanaoka, Goichiro; Nishigaki, Masakatsu 1 2015 Multi-party computation with small shuffle complexity using regular polygon cards. Zbl 1388.94078Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji 1 2015 Dynamic threshold public-key encryption with decryption consistency from static assumptions. Zbl 1358.94077Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo 1 2015 Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms. Zbl 1359.94616Matsuda, Takahiro; Hanaoka, Goichiro 1 2015 A framework and compact constructions for non-monotonic attribute-based encryption. Zbl 1335.94084Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 6 2014 Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications. Zbl 1334.94096Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 4 2014 Chosen ciphertext security via UCE. Zbl 1335.94068Matsuda, Takahiro; Hanaoka, Goichiro 4 2014 Chosen ciphertext security via point obfuscation. Zbl 1317.94122Matsuda, Takahiro; Hanaoka, Goichiro 2 2014 More constructions of re-splittable threshold public key encryption. Zbl 1417.94079Ohata, Satsuya; Matsuda, Takahiro; Hanaoka, Goichiro; Matsuura, Kanta 1 2014 Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues. Zbl 1378.94070Yamakawa, Takashi; Yamada, Shota; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru 1 2014 A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list. Zbl 1404.94037Attrapadung, Nuttapong; Emura, Keita; Hanaoka, Goichiro; Sakai, Yusuke 1 2014 All-but-one dual projective hashing and its applications. Zbl 1353.94079Zhang, Zongyang; Chen, Yu; Chow, Sherman S. M.; Hanaoka, Goichiro; Cao, Zhenfu; Zhao, Yunlei 1 2014 Group signatures with message-dependent opening. Zbl 1305.94092Sakai, Yusuke; Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Omote, Kazumasa 5 2013 Chosen ciphertext secure keyed-homomorphic public-key encryption. Zbl 1314.94066Emura, Keita; Hanaoka, Goichiro; Ohtake, Go; Matsuda, Takahiro; Yamada, Shota 2 2013 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1364.94560Nuida, Koji; Hanaoka, Goichiro 1 2013 Ciphertext policy multi-dimensional range encryption. Zbl 1342.94073Kasamatsu, Kohei; Matsuda, Takahiro; Hanaoka, Goichiro; Imai, Hideki 1 2013 Generic construction of chosen ciphertext secure proxy re-encryption. Zbl 1292.94072Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei 7 2012 Time-specific encryption from forward-secure encryption. Zbl 1310.94154Kasamatsu, Kohei; Matsuda, Takahiro; Emura, Keita; Attrapadung, Nuttapong; Hanaoka, Goichiro; Imai, Hideki 5 2012 On the security of dynamic group signatures: preventing signature hijacking. Zbl 1291.94196Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo 5 2012 On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. Zbl 1296.94120Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. 4 2012 Two-dimensional representation of cover free families and its applications: short signatures and more. Zbl 1292.94155Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 3 2012 Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. Zbl 1270.11125Sakemi, Yumi; Hanaoka, Goichiro; Izu, Tetsuya; Takenaka, Masahiko; Yasuda, Masaya 2 2012 Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. Zbl 1290.94158Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru 1 2012 Space efficient signature schemes from the RSA assumption. Zbl 1252.94116Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru 1 2012 Generic constructions for chosen-ciphertext secure attribute based encryption. Zbl 1291.94170Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru 7 2011 On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Zbl 1291.94167Weng, Jian; Zhao, Yunlei; Hanaoka, Goichiro 3 2011 Generic constructions of parallel key-insulated encryption. Zbl 1286.68112Hanaoka, Goichiro; Weng, Jian 2 2010 Applications of signcryption. Zbl 1217.68084Cui, Yang; Hanaoka, Goichiro 1 2010 On the security of pseudorandomized information-theoretically secure schemes. Zbl 1282.94061Nuida, Koji; Hanaoka, Goichiro 1 2010 Improving efficiency of an ‘on the fly’ identification scheme by perfecting zero-knowledgeness. Zbl 1274.94110Santoso, Bagus; Ohta, Kazuo; Sakiyama, Kazuo; Hanaoka, Goichiro 1 2010 Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. Zbl 1206.94070Hanaoka, Goichiro; Kurosawa, Kaoru 13 2008 Orthogonality between key privacy and data privacy, revisited. Zbl 1166.94346Zhang, Rui; Hanaoka, Goichiro; Imai, Hideki 1 2008 An efficient strong key-insulated signature scheme and its application. Zbl 1300.94114Ohtake, Go; Hanaoka, Goichiro; Ogawa, Kazuto 1 2008 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 12 2007 Formal security treatments for signatures from identity-based encryption. Zbl 1138.94379Cui, Yang; Fujisaki, Eiichiro; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 1 2007 Parallel key-insulated public key encryption. Zbl 1151.94515Hanaoka, Goichiro; Hanaoka, Yumiko; Imai, Hideki 12 2006 Efficient identity-based encryption with tight security reduction. Zbl 1307.94034Attrapadung, Nuttapong; Furukawa, Jun; Gomi, Takeshi; Hanaoka, Goichiro; Imai, Hideki; Zhang, Rui 6 2006 Generic transforms to acquire cca-security for identity based encryption: the cases of FO\(_{\text{pkc}}\) and react. Zbl 1176.94047Kitagawa, Takashi; Yang, Peng; Hanaoka, Goichiro; Zhang, Rui; Watanabe, Hajime; Matsuura, Kanta; Imai, Hideki 3 2006 Applying Fujisaki-Okamoto to identity-based encryption. Zbl 1125.94029Yang, Peng; Kitagawa, Takashi; Hanaoka, Goichiro; Zhang, Rui; Matsuura, Kanta; Imai, Hideki 3 2006 Reducing the spread of damage of key exposures in key-insulated encryption. Zbl 1295.94130Phan, Thi Lan Anh; Hanaoka, Yumiko; Hanaoka, Goichiro; Matsuura, Kanta; Imai, Hideki 1 2006 A short random fingerprinting code against a small number of pirates. Zbl 1125.94042Hagiwara, Manabu; Hanaoka, Goichiro; Imai, Hideki 1 2006 Identity-based hierarchical strongly key-insulated encryption and its application. Zbl 1154.94393Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 8 2005 On the security of multiple encryption or CCA-security + CCA-security = CCA-security? Zbl 1198.94140Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 3 2004 Unconditionally secure key insulated cryptosystems: Models, bounds and constructions. Zbl 1023.68553Hanaoka, Yumiko; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki 4 2002 Security notions for unconditionally secure signature schemes. Zbl 1056.94523Shikata, Junji; Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 2002 Unconditionally secure anonymous encryption and group authentication. Zbl 1065.94550Hanaoka, Goichiro; Shikata, Junji; Hanaoka, Yumiko; Imai, Hideki 2 2002 A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks. Zbl 1011.68038Hanaoka, Goichiro; Nishioka, Tsuyoshi; Zheng, Yuliang; Imai, Hideki 1 2002 Efficient asymmetric public-key traitor tracing without trusted agents. Zbl 0991.94051Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 4 2001 Efficient asymmetric self-enforcement scheme with public traceability. Zbl 0996.94521Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki 1 2001 Unconditionally secure digital signature schemes admitting transferability. Zbl 0980.94025Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki 5 2000 LITESET: A light-weight secure electronic transaction protocol. Zbl 0902.68056Hanaoka, Goichiro; Zheng, Yuliang; Imai, Hideki 2 1998 all cited Publications top 5 cited Publications all top 5 Cited by 328 Authors 16 Hanaoka, Goichiro 7 Yamada, Shota 6 Hofheinz, Dennis 6 Kunihiro, Noboru 6 Libert, Benoît 6 Matsuda, Takahiro 6 Park, Jonghwan 5 Kiltz, Eike 5 Nuida, Koji 5 Shikata, Junji 5 Weng, Jian 4 Attrapadung, Nuttapong 4 Emura, Keita 4 Lee, Dong Hoon 4 Long, Yu 4 Susilo, Willy 4 Venturi, Daniele 4 Watanabe, Yodai 3 Abdalla, Michel 3 Bellare, Mihir 3 Catalano, Dario 3 Chase, Melissa 3 Chen, Jie 3 Choi, Seung Geol 3 Dodis, Yevgeniy 3 Farshim, Pooya 3 Fiore, Dario 3 Ghadafi, Essam M. 3 Groth, Jens 3 Imai, Hideki 3 Lee, Kwangsu 3 Ling, San 3 Liu, Shengli 3 Nandi, Mridul 3 Nguyen, Khoa 3 Pandit, Tapas 3 Paterson, Kenneth G. 3 Wan, Zhongmei 3 Yamakawa, Takashi 3 Yung, Moti 2 Abe, Takuro 2 Agrawal, Shashank 2 Albrecht, Martin R. 2 Biagioni, Silvio 2 Boneh, Dan 2 Bootle, Jonathan 2 Cash, David M. 2 Cerulli, Andrea 2 Chaidos, Pyrros 2 Chen, Jianhong 2 Chen, Kefei 2 Chen, Yu 2 Coretti, Sandro 2 Dachman-Soled, Dana 2 Deng, Robert Huijie 2 Dobrovol’skiĭ, Nikolaĭ Mikhaĭlovich 2 Dobrovol’skiĭ, Nikolai Nikolaevich 2 Dutta, Ratna 2 Gong, Junqing 2 Guo, Fuchun 2 Han, Shuai 2 Hao, Rong 2 Hong, Xuan 2 Jia, Dingding 2 Kaji, Shizuo 2 Kawai, Yutaka 2 Lai, Junzuo 2 Lai, Xuejia 2 Larraia, Enrique 2 Lee, Donghoon 2 Li, Bao 2 Li, Jiguo 2 Lu, Yang 2 Maeno, Toshiaki 2 Malkin, Tal G. 2 Masny, Daniel 2 Matsumoto, Tsutomu 2 Matsuura, Kanta 2 Miyahara, Daiki 2 Mizuki, Takaaki 2 Mouhartem, Fabrice 2 Mu, Yi 2 Nizzardo, Luca 2 Numata, Yasuhide 2 Ogawa, Kazuto 2 Ohtake, Go 2 Peters, Thomas J. 2 Phan Duong Hieu 2 Ràfols, Carla 2 Seo, Jae Hong 2 Shoup, Victor 2 Sone, Hideaki 2 Stepanovs, Igors 2 Tackmann, Björn 2 Tanaka, Keisuke 2 Tessaro, Stefano 2 Tibouchi, Mehdi 2 Trinh, Viet Cuong 2 Wang, Huaxiong 2 Watanabe, Hajime ...and 228 more Authors all top 5 Cited in 22 Serials 21 Theoretical Computer Science 19 Designs, Codes and Cryptography 12 Journal of Cryptology 7 Information Sciences 4 Journal of Mathematical Cryptology 3 Information Processing Letters 3 Algorithmica 3 Journal of Shanghai Jiaotong University (Science) 2 Journal of Computer and System Sciences 2 International Journal of Foundations of Computer Science 2 Quantum Information Processing 2 Chebyshevskiĭ Sbornik 2 Advances in Mathematics of Communications 1 Discrete Applied Mathematics 1 Mathematical and Computer Modelling 1 International Journal of Computer Mathematics 1 Applicable Algebra in Engineering, Communication and Computing 1 Mathematical Problems in Engineering 1 Soft Computing 1 Journal of Zhejiang University. Science A 1 Science China. Information Sciences 1 Frontiers of Computer Science all top 5 Cited in 9 Fields 147 Information and communication theory, circuits (94-XX) 25 Computer science (68-XX) 6 Number theory (11-XX) 2 Algebraic geometry (14-XX) 2 Quantum theory (81-XX) 1 Combinatorics (05-XX) 1 General algebraic systems (08-XX) 1 Commutative algebra (13-XX) 1 Numerical analysis (65-XX) Citations by Year