Goichiro Hanaoka
Orcid: 0000-0001-6617-2962
According to our database1,
Goichiro Hanaoka
authored at least 259 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IEEE Access, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
Des. Codes Cryptogr., May, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., August, 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Des. Codes Cryptogr., 2022
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Theor. Comput. Sci., 2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
2018
IET Inf. Secur., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Provable Security, 2018
Proceedings of the Provable Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Computer Security, 2018
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Pervasive Mob. Comput., 2017
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017
IEICE Trans. Inf. Syst., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptol. ePrint Arch., 2017
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Algorithmica, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016
Secur. Commun. Networks, 2016
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Secur. Commun. Networks, 2016
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
J. Inf. Process., 2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
IACR Cryptol. ePrint Arch., 2016
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
BMC Bioinform., December, 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption.
IACR Cryptol. ePrint Arch., 2015
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
Proceedings of the Provable Security, 2015
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data.
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Int. J. Inf. Sec., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions.
IACR Cryptol. ePrint Arch., 2014
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEEE Trans. Inf. Theory, 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
IACR Cryptol. ePrint Arch., 2012
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Proceedings of the Topics in Cryptology, 2010
2009
IEICE Trans. Inf. Syst., 2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Progress in Cryptology, 2009
2008
IEEE Trans. Inf. Theory, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Advances in Information and Computer Security, 2008
Proceedings of the Progress in Cryptology, 2008
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Public Key Infrastructure, 2008
2007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Inf. Syst., 2007
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007
Proceedings of the Provable Security, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Inf. Media Technol., 2006
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.
IACR Cryptol. ePrint Arch., 2006
Comput. J., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Applied Algebra, 2006
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006
Proceedings of the Applied Algebra, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Topics in Cryptology, 2001
2000
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998