Hanaoka Goichiro
Hanaoka Goichiro
Unknown affiliation
No verified email
Cited by
Cited by
Identity-based hierarchical strongly key-insulated encryption and its application
Y Hanaoka, G Hanaoka, J Shikata, H Imai
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
Digitally signed document sanitizing scheme based on bilinear maps
K Miyazaki, G Hanaoka, H Imai
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
G Hanaoka, K Kurosawa
International Conference on the Theory and Application of Cryptology and …, 2008
Parallel key-insulated public key encryption
G Hanaoka, Y Hanaoka, H Imai
Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017
Unconditionally secure digital signature schemes admitting transferability
G Hanaoka, J Shikata, Y Zheng, H Imai
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
A framework for identity-based encryption with almost tight security
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
On the security of the schnorr signature scheme and DSA against related-key attacks
H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
Efficient asymmetric public-key traitor tracing without trusted agents
Y Watanabe, G Hanaoka, H Imai
Cryptographers’ Track at the RSA Conference, 392-407, 2001
Attribute-based signatures for circuits from bilinear map
Y Sakai, N Attrapadung, G Hanaoka
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
R Zhang, G Hanaoka, J Shikata, H Imai
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Security notions for unconditionally secure signature schemes
J Shikata, G Hanaoka, Y Zheng, H Imai
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks
G Hanaoka, T Nishioka, Y Zheng, H Imai
The Computer Journal 45 (3), 293-303, 2002
The system can't perform the operation now. Try again later.
Articles 1–20