Goichiro Hanaoka

From MaRDI portal
(Redirected from Person:278730)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions2024-03-14Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE
Designs, Codes and Cryptography
2023-04-28Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
1511.68043
2022-12-22Paper
On Private Information Retrieval Supporting Range Queries
1511.68044
2022-12-22Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication
Designs, Codes and Cryptography
2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
Generic hardness of inversion on ring and its relation to self-bilinear map
Theoretical Computer Science
2020-04-21Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Theoretical Computer Science
2019-10-18Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
International Journal of Applied Cryptography
2018-11-26Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Token-based multi-input functional encryption2018-11-07Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data2018-10-24Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Lecture Notes in Computer Science
2018-10-17Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
Designs, Codes and Cryptography
2018-07-03Paper
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem2018-05-16Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
Secure grouping protocol using a deck of cards
(available as arXiv preprint)
2018-03-16Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Algorithmica
2018-01-05Paper
Towards user-friendly cryptography2017-10-23Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
IEEE Transactions on Information Theory
2017-06-08Paper
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
Lecture Notes in Computer Science
2017-01-06Paper
Size-Hiding Computation for Multiple Parties
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security
Information and Communications Security
2016-12-19Paper
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Signatures Resilient to Uninvertible Leakage
Lecture Notes in Computer Science
2016-10-21Paper
Attribute-based encryption for range attributes
Lecture Notes in Computer Science
2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff
Applied Cryptography and Network Security
2016-10-04Paper
Fuzzy signatures: relaxing requirements and a new construction
Applied Cryptography and Network Security
2016-10-04Paper
Generalized hardness assumption for self-bilinear map with auxiliary information
Information Security and Privacy
2016-09-02Paper
A Framework for Identity-Based Encryption with Almost Tight Security
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Attribute-based signatures for circuits from bilinear map
Public-Key Cryptography – PKC 2016
2016-04-13Paper
On the key dependent message security of the Fujisaki-Okamoto constructions
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security
Public-Key Cryptography – PKC 2016
2016-04-13Paper
A signature scheme with a fuzzy private key
Applied Cryptography and Network Security
2016-03-10Paper
Completeness of single-bit projection-KDM security for public key encryption
Lecture Notes in Computer Science
2016-03-02Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
Lecture Notes in Computer Science
2016-03-02Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model
Provable Security
2016-01-27Paper
Multi-party computation with small shuffle complexity using regular polygon cards
Provable Security
2016-01-27Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
Compact public key encryption with minimum ideal property of hash functions
Provable Security
2015-09-29Paper
A short fail-stop signature scheme from factoring
Provable Security
2015-09-29Paper
Efficient key dependent message security amplification against chosen ciphertext attacks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
Theory of Cryptography
2015-07-06Paper
More constructions of re-splittable threshold public key encryption
Advances in Information and Computer Security
2015-05-27Paper
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues
Lecture Notes in Computer Science
2014-10-14Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption
Advances in Information and Computer Security
2014-09-15Paper
Reducing the spread of damage of key exposures in key-insulated encryption
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
Applied Cryptography and Network Security
2014-07-07Paper
All-but-one dual projective hashing and its applications
Applied Cryptography and Network Security
2014-07-07Paper
Chosen ciphertext security via UCE
Public-Key Cryptography – PKC 2014
2014-03-25Paper
A framework and compact constructions for non-monotonic attribute-based encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Chosen ciphertext security via point obfuscation
Theory of Cryptography
2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption
Lecture Notes in Computer Science
2013-06-04Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Key encapsulation mechanisms from extractable hash proof systems, revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Lecture Notes in Computer Science
2012-09-25Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
Public Key Cryptography – PKC 2012
2012-07-20Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
Public Key Cryptography – PKC 2012
2012-07-20Paper
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
Public Key Cryptography – PKC 2012
2012-07-20Paper
Space efficient signature schemes from the RSA assumption
Public Key Cryptography – PKC 2012
2012-07-20Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
Two-dimensional representation of cover free families and its applications: short signatures and more
Lecture Notes in Computer Science
2012-06-08Paper
Towards restricting plaintext space in public key encryption
Advances in Information and Computer Security
2011-11-10Paper
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks
Applied Cryptography and Network Security
2011-06-28Paper
Applications of signcryption
Practical Signcryption
2011-05-18Paper
Generic constructions for chosen-ciphertext secure attribute based encryption
Public Key Cryptography – PKC 2011
2011-03-15Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
Public Key Cryptography – PKC 2011
2011-03-15Paper
Efficient broadcast encryption with personalized messages
Provable Security
2010-10-12Paper
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
Provable Security
2010-10-12Paper
An improvement of pseudorandomization against unbounded attack algorithms -- the case of fingerprint codes
Lecture Notes in Computer Science
2010-09-29Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
Lecture Notes in Computer Science
2010-09-29Paper
Generic constructions of parallel key-insulated encryption
Lecture Notes in Computer Science
2010-09-10Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
Lecture Notes in Computer Science
2010-02-09Paper
The role of arbiters in asymmetric authentication schemes
Lecture Notes in Computer Science
2010-02-09Paper
Unconditionally secure chaffing-and-winnowing for multiple use
Lecture Notes in Computer Science
2009-12-03Paper
On the Theoretical Gap between Group Signatures with and without Unlinkability
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited
Information Security and Cryptology
2009-02-10Paper
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
Lecture Notes in Computer Science
2009-01-09Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
An Efficient Strong Key-Insulated Signature Scheme and Its Application
Public Key Infrastructure
2008-06-12Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption
Provable Security
2008-06-10Paper
Bounded CCA2-Secure Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Trade-Off Traitor Tracing
Lecture Notes in Computer Science
2008-04-11Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Lecture Notes in Computer Science
2008-03-18Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
Information Security and Privacy
2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Information Security and Privacy
2007-09-07Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2086723 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2085422 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2080181 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2043335 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1980951 (Why is no real title available?)2003-09-15Paper
Unconditionally Secure Anonymous Encryption and Group Authentication
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941244 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1618052 (Why is no real title available?)2002-11-04Paper
scientific article; zbMATH DE number 1617941 (Why is no real title available?)2002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks
The Computer Journal
2002-08-28Paper
scientific article; zbMATH DE number 1424191 (Why is no real title available?)2002-04-08Paper
scientific article; zbMATH DE number 1583775 (Why is no real title available?)2002-03-06Paper
scientific article; zbMATH DE number 1504561 (Why is no real title available?)2002-01-29Paper
scientific article; zbMATH DE number 1420972 (Why is no real title available?)2000-09-04Paper
scientific article; zbMATH DE number 1189383 (Why is no real title available?)1998-08-13Paper


Research outcomes over time


This page was built for person: Goichiro Hanaoka