The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Goichiro Hanaoka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai
    A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:193-202 [Conf]
  2. Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:154-162 [Conf]
  3. Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
    Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:183-192 [Conf]
  4. Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:215-226 [Conf]
  5. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  6. Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
    Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:62-73 [Conf]
  7. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai
    Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:365-376 [Conf]
  8. Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
    Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:123-135 [Conf]
  9. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:355-368 [Conf]
  10. Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
    On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:76-90 [Conf]
  11. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:495-514 [Conf]
  12. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:348-362 [Conf]
  13. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:81-99 [Conf]
  14. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:130-142 [Conf]
  15. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:19-36 [Conf]
  16. Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
    Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:343-354 [Conf]
  17. Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:392-407 [Conf]
  18. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:434-449 [Conf]
  19. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:85-96 [Conf]
  20. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:157-168 [Conf]
  21. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:428-441 [Conf]
  22. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:151-164 [Conf]
  23. Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai
    A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:259-270 [Conf]
  24. Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai
    A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:224-236 [Conf]
  25. Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:257-271 [Conf]
  26. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  27. Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:225-239 [Conf]
  28. Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai
    Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:105-122 [Conf]
  29. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:64-79 [Conf]
  30. Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:360-374 [Conf]
  31. Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:366-384 [Conf]
  32. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:3, pp:293-303 [Journal]
  33. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:3, pp:310-321 [Journal]
  34. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai
    Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal]
  35. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal]
  36. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:502-518 [Conf]
  37. Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A Practical Provider Authentication System for Bidirectional Broadcast Service. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:967-974 [Conf]
  38. Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
    Anonymous Authentication Scheme for Subscription Services. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:975-983 [Conf]
  39. Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
    Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:984-991 [Conf]
  40. Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:68-84 [Conf]
  41. Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:218-227 [Conf]

  42. Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (, )][DBLP]


  43. A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]


  44. Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]


  45. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. [Citation Graph (, )][DBLP]


  46. Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP]


  47. An Efficient Strong Key-Insulated Signature Scheme and Its Application. [Citation Graph (, )][DBLP]


  48. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  49. Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP]


  50. A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. [Citation Graph (, )][DBLP]


  51. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]


  52. Generic Constructions of Parallel Key-Insulated Encryption. [Citation Graph (, )][DBLP]


  53. On the Theoretical Gap between Group Signatures with and without Unlinkability. [Citation Graph (, )][DBLP]


  54. Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). [Citation Graph (, )][DBLP]


  55. On the Security of Pseudorandomized Information-Theoretically Secure Schemes. [Citation Graph (, )][DBLP]


  56. An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes. [Citation Graph (, )][DBLP]


  57. A Secure Traitor Tracing Scheme against Key Exposure [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002