Search the dblp DataBase
Goichiro Hanaoka :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Manabu Hagiwara , Goichiro Hanaoka , Hideki Imai A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:193-202 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Manabu Hagiwara , Hajime Watanabe , Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:154-162 [Conf ] Peng Yang 0002 , Takashi Kitagawa , Goichiro Hanaoka , Rui Zhang 0002 , Kanta Matsuura , Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:183-192 [Conf ] Goichiro Hanaoka , Yuliang Zheng , Hideki Imai LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:215-226 [Conf ] Takashi Kitagawa , Peng Yang 0002 , Goichiro Hanaoka , Rui Zhang 0002 , Hajime Watanabe , Kanta Matsuura , Hideki Imai Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:348-359 [Conf ] Goichiro Hanaoka , Hideki Imai , Jörn Müller-Quade , Anderson C. A. Nascimento , Akira Otsuka , Andreas Winter Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:62-73 [Conf ] Goichiro Hanaoka , Kazuto Ogawa , Itsuro Murota , Go Ohtake , Keigo Majima , Kimiyuki Oyamada , Seiichi Gohshi , Seiichi Namba , Hideki Imai Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:365-376 [Conf ] Kazuto Ogawa , Goichiro Hanaoka , Hideki Imai Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:123-135 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Akira Otsuka , Goichiro Hanaoka , Hideki Imai Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:355-368 [Conf ] Rui Zhang 0002 , Goichiro Hanaoka , Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:76-90 [Conf ] Yumiko Hanaoka , Goichiro Hanaoka , Junji Shikata , Hideki Imai Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:495-514 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:348-362 [Conf ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:81-99 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:130-142 [Conf ] Nuttapong Attrapadung , Jun Furukawa , Takeshi Gomi , Goichiro Hanaoka , Hideki Imai , Rui Zhang 0002 Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:19-36 [Conf ] Kunihiko Miyazaki , Goichiro Hanaoka , Hideki Imai Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:343-354 [Conf ] Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:392-407 [Conf ] Junji Shikata , Goichiro Hanaoka , Yuliang Zheng , Hideki Imai Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:434-449 [Conf ] Yumiko Hanaoka , Goichiro Hanaoka , Junji Shikata , Hideki Imai Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:85-96 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:157-168 [Conf ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:428-441 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Akira Otsuka , Goichiro Hanaoka , Hideki Imai Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:151-164 [Conf ] Tsuyoshi Nishioka , Goichiro Hanaoka , Hideki Imai A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:259-270 [Conf ] Daisuke Nojiri , Goichiro Hanaoka , Hideki Imai A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:224-236 [Conf ] Shoko Yonezawa , Goichiro Hanaoka , Junji Shikata , Hideki Imai Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:257-271 [Conf ] Nuttapong Attrapadung , Yang Cui , David Galindo , Goichiro Hanaoka , Ichiro Hasuo , Hideki Imai , Kanta Matsuura , Peng Yang 0002 , Rui Zhang 0002 Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] LATIN, 2006, pp:130-141 [Conf ] Hirotaka Komaki , Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:225-239 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Hideki Imai Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:105-122 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:64-79 [Conf ] Rui Zhang 0002 , Goichiro Hanaoka , Junji Shikata , Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:360-374 [Conf ] Thi Lan Anh Phan , Yumiko Hanaoka , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:366-384 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:3, pp:293-303 [Journal ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP ] Comput. J., 2006, v:49, n:3, pp:310-321 [Journal ] Goichiro Hanaoka , Kazuto Ogawa , Itsuro Murota , Go Ohtake , Keigo Majima , Seiichi Gohshi , Kimiyuki Oyamada , Seiichi Namba , Hideki Imai Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal ] Ronald Cramer , Goichiro Hanaoka , Dennis Hofheinz , Hideki Imai , Eike Kiltz , Rafael Pass , Abhi Shelat , Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:502-518 [Conf ] Takahiro Matsuda , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai A Practical Provider Authentication System for Bidirectional Broadcast Service. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:967-974 [Conf ] Arisa Fujii , Go Ohtake , Goichiro Hanaoka , Kazuto Ogawa Anonymous Authentication Scheme for Subscription Services. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:975-983 [Conf ] Kazuto Ogawa , Goichiro Hanaoka , Kazukuni Kobara , Kanta Matsuura , Hideki Imai Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:984-991 [Conf ] Takahiro Matsuda , Nuttapong Attrapadung , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:68-84 [Conf ] Yang Cui , Eiichiro Fujisaki , Goichiro Hanaoka , Hideki Imai , Rui Zhang 0002 Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:218-227 [Conf ] Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (, )][DBLP ] A generic construction of useful client puzzles. [Citation Graph (, )][DBLP ] Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP ] An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. [Citation Graph (, )][DBLP ] Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP ] An Efficient Strong Key-Insulated Signature Scheme and Its Application. [Citation Graph (, )][DBLP ] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP ] Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP ] A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. [Citation Graph (, )][DBLP ] Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP ] Generic Constructions of Parallel Key-Insulated Encryption. [Citation Graph (, )][DBLP ] On the Theoretical Gap between Group Signatures with and without Unlinkability. [Citation Graph (, )][DBLP ] Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk). [Citation Graph (, )][DBLP ] On the Security of Pseudorandomized Information-Theoretically Secure Schemes. [Citation Graph (, )][DBLP ] An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes. [Citation Graph (, )][DBLP ] A Secure Traitor Tracing Scheme against Key Exposure [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.007secs