Follow
Hanaoka Goichiro
Hanaoka Goichiro
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Identity-based hierarchical strongly key-insulated encryption and its application
Y Hanaoka, G Hanaoka, J Shikata, H Imai
International conference on the theory and application of cryptology and …, 2005
1102005
Digitally signed document sanitizing scheme based on bilinear maps
K Miyazaki, G Hanaoka, H Imai
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1032006
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
International Conference on the Theory and Application of Cryptology and …, 2007
972007
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 71-89, 2011
942011
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 275-292, 2014
932014
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
G Hanaoka, K Kurosawa
International Conference on the Theory and Application of Cryptology and …, 2008
932008
Parallel key-insulated public key encryption
G Hanaoka, Y Hanaoka, H Imai
International workshop on public key cryptography, 105-122, 2006
882006
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Cryptographers’ Track at the RSA Conference, 349-364, 2012
792012
Unconditionally secure digital signature schemes admitting transferability
G Hanaoka, J Shikata, Y Zheng, H Imai
International Conference on the Theory and Application of Cryptology and …, 2000
682000
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
International Workshop on Public Key Cryptography, 715-732, 2012
602012
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
International Conference on Pairing-Based Cryptography, 270-294, 2012
572012
A framework for identity-based encryption with almost tight security
N Attrapadung, G Hanaoka, S Yamada
International Conference on the Theory and Application of Cryptology and …, 2015
562015
Efficient asymmetric public-key traitor tracing without trusted agents
Y Watanabe, G Hanaoka, H Imai
Cryptographers’ Track at the RSA Conference, 392-407, 2001
502001
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
R Zhang, G Hanaoka, J Shikata, H Imai
International Workshop on Public Key Cryptography, 360-374, 2004
482004
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017
462017
Security notions for unconditionally secure signature schemes
J Shikata, G Hanaoka, Y Zheng, H Imai
International Conference on the Theory and Applications of Cryptographic …, 2002
462002
Attribute-based signatures for circuits from bilinear map
Y Sakai, N Attrapadung, G Hanaoka
Public-Key Cryptography–PKC 2016, 283-300, 2016
452016
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
International Workshop on Public Key Cryptography, 243-261, 2012
452012
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks
G Hanaoka, T Nishioka, Y Zheng, H Imai
The Computer Journal 45 (3), 293-303, 2002
452002
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
J Weng, Y Zhao, G Hanaoka
International Workshop on Public Key Cryptography, 284-295, 2011
432011
The system can't perform the operation now. Try again later.
Articles 1–20