Goichiro Hanaoka

From MaRDI portal
Person:278730

Available identifiers

zbMath Open hanaoka.goichiroDBLP88/1238WikidataQ86929914 ScholiaQ86929914MaRDI QIDQ278730

List of research outcomes





PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions2024-03-14Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition2022-12-22Paper
On Private Information Retrieval Supporting Range Queries2022-12-22Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019-10-18Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures2018-11-26Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Token-based multi-input functional encryption2018-11-07Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data2018-10-24Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2018-10-17Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem2018-05-16Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
Secure grouping protocol using a deck of cards2018-03-16Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Towards user-friendly cryptography2017-10-23Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2017-06-08Paper
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness2017-01-06Paper
Size-Hiding Computation for Multiple Parties2017-01-06Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones2017-01-06Paper
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security2016-12-19Paper
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli2016-10-27Paper
Signatures Resilient to Uninvertible Leakage2016-10-21Paper
Attribute-based encryption for range attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
Fuzzy signatures: relaxing requirements and a new construction2016-10-04Paper
Generalized hardness assumption for self-bilinear map with auxiliary information2016-09-02Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs2016-06-10Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks2016-05-19Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Attribute-based signatures for circuits from bilinear map2016-04-13Paper
On the key dependent message security of the Fujisaki-Okamoto constructions2016-04-13Paper
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security2016-04-13Paper
A signature scheme with a fuzzy private key2016-03-10Paper
Completeness of single-bit projection-KDM security for public key encryption2016-03-02Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption2016-03-02Paper
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model2016-01-27Paper
Multi-party computation with small shuffle complexity using regular polygon cards2016-01-27Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions2015-10-20Paper
Compact public key encryption with minimum ideal property of hash functions2015-09-29Paper
A short fail-stop signature scheme from factoring2015-09-29Paper
Efficient key dependent message security amplification against chosen ciphertext attacks2015-09-11Paper
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms2015-07-06Paper
More constructions of re-splittable threshold public key encryption2015-05-27Paper
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues2014-10-14Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption2014-09-15Paper
Reducing the spread of damage of key exposures in key-insulated encryption2014-08-21Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2014-08-07Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list2014-07-07Paper
All-but-one dual projective hashing and its applications2014-07-07Paper
Chosen ciphertext security via UCE2014-03-25Paper
A framework and compact constructions for non-monotonic attribute-based encryption2014-03-25Paper
Chosen ciphertext security via point obfuscation2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption2013-04-19Paper
Key encapsulation mechanisms from extractable hash proof systems, revisited2013-04-19Paper
Group signatures with message-dependent opening2013-04-04Paper
Time-specific encryption from forward-secure encryption2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012-09-25Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms2012-07-20Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication2012-07-20Paper
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve2012-07-20Paper
Space efficient signature schemes from the RSA assumption2012-07-20Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
Two-dimensional representation of cover free families and its applications: short signatures and more2012-06-08Paper
Towards restricting plaintext space in public key encryption2011-11-10Paper
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks2011-06-28Paper
Applications of signcryption2011-05-18Paper
Generic constructions for chosen-ciphertext secure attribute based encryption2011-03-15Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 20102011-03-15Paper
Efficient broadcast encryption with personalized messages2010-10-12Paper
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption2010-10-12Paper
An improvement of pseudorandomization against unbounded attack algorithms -- the case of fingerprint codes2010-09-29Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2010-09-29Paper
Generic constructions of parallel key-insulated encryption2010-09-10Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness2010-03-16Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
The role of arbiters in asymmetric authentication schemes2010-02-09Paper
Unconditionally secure chaffing-and-winnowing for multiple use2009-12-03Paper
On the Theoretical Gap between Group Signatures with and without Unlinkability2009-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited2009-02-10Paper
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption2009-02-10Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low2009-01-22Paper
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)2009-01-09Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
An Efficient Strong Key-Insulated Signature Scheme and Its Application2008-06-12Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption2008-06-10Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Trade-Off Traitor Tracing2008-04-11Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2008-03-18Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service2007-09-07Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT2007-09-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724182004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44507682004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283312003-09-15Paper
Unconditionally Secure Anonymous Encryption and Group Authentication2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084442003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q27245982002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27244582002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks2002-08-28Paper
https://portal.mardi4nfdi.de/entity/Q49453912002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45025132002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q49450442000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q38391791998-08-13Paper

Research outcomes over time

This page was built for person: Goichiro Hanaoka