The SCEAS System
| |||||||

## Search the dblp DataBase
Goichiro Hanaoka:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai
**A Short Random Fingerprinting Code Against a Small Number of Pirates.**[Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:193-202 [Conf] - Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
**Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.**[Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:154-162 [Conf] - Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
**Applying Fujisaki-Okamoto to Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] AAECC, 2006, pp:183-192 [Conf] - Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
**LITESET: A Light-Weight Secure Electronic Transaction Protocol.**[Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:215-226 [Conf] - Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
**Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:348-359 [Conf] - Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
**Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:62-73 [Conf] - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai
**Separating Encryption and Key Issuance in Digital Rights Management Systems.**[Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:365-376 [Conf] - Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
**Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.**[Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:123-135 [Conf] - Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
**Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:355-368 [Conf] - Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
**On the Security of Cryptosystems with All-or-Nothing Transform.**[Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:76-90 [Conf] - Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
**Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:495-514 [Conf] - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
**An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:348-362 [Conf] - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
**Unconditionally Secure Anonymous Encryption and Group Authentication.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:81-99 [Conf] - Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
**Unconditionally Secure Digital Signature Schemes Admitting Transferability.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:130-142 [Conf] - Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
**Efficient Identity-Based Encryption with Tight Security Reduction.**[Citation Graph (0, 0)][DBLP] CANS, 2006, pp:19-36 [Conf] - Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
**Digitally signed document sanitizing scheme based on bilinear maps.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:343-354 [Conf] - Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
**Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:392-407 [Conf] - Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
**Security Notions for Unconditionally Secure Signature Schemes.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:434-449 [Conf] - Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
**Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:85-96 [Conf] - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
**Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.**[Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:157-168 [Conf] - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
**The Role of Arbiters in Asymmetric Authentication Schemes.**[Citation Graph (0, 0)][DBLP] ISC, 2003, pp:428-441 [Conf] - Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
**Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.**[Citation Graph (0, 0)][DBLP] ISC, 2003, pp:151-164 [Conf] - Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai
**A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.**[Citation Graph (0, 0)][DBLP] ISW, 1999, pp:259-270 [Conf] - Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai
**A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.**[Citation Graph (0, 0)][DBLP] ISW, 2000, pp:224-236 [Conf] - Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai
**Traceability Schemes for Signed Documents.**[Citation Graph (0, 0)][DBLP] ISC, 2002, pp:257-271 [Conf] - Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
**Relations Among Notions of Security for Identity Based Encryption Schemes.**[Citation Graph (0, 0)][DBLP] LATIN, 2006, pp:130-141 [Conf] - Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
**Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2001, pp:225-239 [Conf] - Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai
**Parallel Key-Insulated Public Key Encryption.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:105-122 [Conf] - Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
**Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:64-79 [Conf] - Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
**On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:360-374 [Conf] - Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
**Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:366-384 [Conf] - Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
**A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.**[Citation Graph (0, 0)][DBLP] Comput. J., 2002, v:45, n:3, pp:293-303 [Journal] - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
**Unconditionally Secure Anonymous Encryption and Group Authentication.**[Citation Graph (0, 0)][DBLP] Comput. J., 2006, v:49, n:3, pp:310-321 [Journal] - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai
**Managing Encryption and Key Publication Independently in Digital Rights Management Systems.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal] - Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
**Efficient Unconditionally Secure Digital Signatures.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal] - Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
**Bounded CCA2-Secure Encryption.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:502-518 [Conf] - Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
**A Practical Provider Authentication System for Bidirectional Broadcast Service.**[Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:967-974 [Conf] - Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa
**Anonymous Authentication Scheme for Subscription Services.**[Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:975-983 [Conf] - Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
**Anonymous Pay-TV System with Secure Revenue Sharing.**[Citation Graph (0, 0)][DBLP] KES (3), 2007, pp:984-991 [Conf] - Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
**A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.**[Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:68-84 [Conf] - Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
**Formal Security Treatments for Signatures from Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:218-227 [Conf] **Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.**[Citation Graph (, )][DBLP]**A generic construction of useful client puzzles.**[Citation Graph (, )][DBLP]**Orthogonality between Key Privacy and Data Privacy, Revisited.**[Citation Graph (, )][DBLP]**An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.**[Citation Graph (, )][DBLP]**Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.**[Citation Graph (, )][DBLP]**An Efficient Strong Key-Insulated Signature Scheme and Its Application.**[Citation Graph (, )][DBLP]**Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.**[Citation Graph (, )][DBLP]**Trade-Off Traitor Tracing.**[Citation Graph (, )][DBLP]**A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.**[Citation Graph (, )][DBLP]**Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.**[Citation Graph (, )][DBLP]**Generic Constructions of Parallel Key-Insulated Encryption.**[Citation Graph (, )][DBLP]**On the Theoretical Gap between Group Signatures with and without Unlinkability.**[Citation Graph (, )][DBLP]**Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).**[Citation Graph (, )][DBLP]**On the Security of Pseudorandomized Information-Theoretically Secure Schemes.**[Citation Graph (, )][DBLP]**An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes.**[Citation Graph (, )][DBLP]**A Secure Traitor Tracing Scheme against Key Exposure**[Citation Graph (, )][DBLP]
Search in 0.065secs, Finished in 0.070secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |