Goichiro Hanaoka

Orcid: 0000-0001-6617-2962

According to our database1, Goichiro Hanaoka authored at least 259 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On private information retrieval supporting range queries.
Int. J. Inf. Sec., February, 2024

More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort.
IACR Cryptol. ePrint Arch., 2024

On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures.
IACR Cryptol. ePrint Arch., 2024

REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory.
IEEE Access, 2024

Multi-query Verifiable PIR and Its Application.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

Maliciously circuit-private multi-key FHE and MPC based on LWE.
Des. Codes Cryptogr., May, 2023

More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters.
IACR Cryptol. ePrint Arch., 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022

How to Extend CTRT for AES-256 and AES-192.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., August, 2022

Tight Security of Twin-DH Hashed ElGamal KEM in Multi-User Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Des. Codes Cryptogr., 2022

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Fully Anonymous Group Signature with Verifier-Local Revocation.
IACR Cryptol. ePrint Arch., 2021

Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Generic hardness of inversion on ring and its relation to self-bilinear map.
Theor. Comput. Sci., 2020

Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020

Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020

Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019

Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A New Combiner for Key Encapsulation Mechanisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
IACR Cryptol. ePrint Arch., 2019

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.
IACR Cryptol. ePrint Arch., 2019

MOBIUS: Model-Oblivious Binarized Neural Networks.
IEEE Access, 2019

An Extended CTRT for AES-256.
Proceedings of the Information Security Applications - 20th International Conference, 2019

2018
Practical attribute-based signature schemes for circuits from bilinear map.
IET Inf. Secur., 2018

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening.
IEICE Trans. Inf. Syst., 2018

More Constructions of Re-Splittable Threshold Public Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018

Secure Grouping Protocol Using a Deck of Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Attribute-Based Encryption for Range Attributes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.
IACR Cryptol. ePrint Arch., 2018

Memory Lower Bounds of Reductions Revisited.
IACR Cryptol. ePrint Arch., 2018

Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2018

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.
Des. Codes Cryptogr., 2018

Fully Anonymous Group Signature with Verifier-Local Revocation.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Embedding Lemmas for Functional Encryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the Security of Linear Sketch Schemes against Recovering Attacks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Compact public key encryption without full random oracles.
Pervasive Mob. Comput., 2017

A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017

Private Similarity Searchable Encryption for Euclidean Distance.
IEICE Trans. Inf. Syst., 2017

Card-Based Protocols Using Regular Polygon Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Group Signature with Deniability: How to Disavow a Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Signatures from Trapdoor Commitments with Strong Openings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Signature Schemes with a Fuzzy Private Key.
IACR Cryptol. ePrint Arch., 2017

A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptol. ePrint Arch., 2017

Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Algorithmica, 2017

Key Management for Versatile Pay-TV Services.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Survey on Identity-Based Encryption from Lattices.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

A limitation on security evaluation of cryptographic primitives with fixed keys.
Secur. Commun. Networks, 2016

Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Secur. Commun. Networks, 2016

Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
J. Inf. Process., 2016

Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

Secure Computation Protocols Using Polarizing Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Convertible Nominative Signatures from Standard Assumptions without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
IACR Cryptol. ePrint Arch., 2016

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016

How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016

Attribute-Based Signatures for Circuits from Bilinear Map.
IACR Cryptol. ePrint Arch., 2016

On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.
IACR Cryptol. ePrint Arch., 2016

Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security.
IACR Cryptol. ePrint Arch., 2016

Signatures Resilient to Uninvertible Leakage.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Towards User-Friendly Cryptography.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Committed AND protocol using three cards with more handy shuffle.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On signatures with tight security in the multi-user setting.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Size-Hiding Computation for Multiple Parties.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

Fuzzy Signatures: Relaxing Requirements and a New Construction.
Proceedings of the Applied Cryptography and Network Security, 2016

Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Privacy-preserving search for chemical compound databases.
BMC Bioinform., December, 2015

Disavowable Public Key Encryption with Non-Interactive Opening.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015

On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2015

A Framework for Identity-Based Encryption with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2015

An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption.
IACR Cryptol. ePrint Arch., 2015

Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms.
IACR Cryptol. ePrint Arch., 2015

Conversions among Several Classes of Predicate Encryption and Their Applications.
IACR Cryptol. ePrint Arch., 2015

Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Content and Key Management to Trace Traitors in Broadcasting Services.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data.
Proceedings of the Advances in Information and Computer Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015

Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.
Proceedings of the Topics in Cryptology, 2015

Constructions of Fail-Stop Signatures for Multi-signer Setting.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

A Signature Scheme with a Fuzzy Private Key.
Proceedings of the Applied Cryptography and Network Security, 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Weakened Anonymity of Group Signature and Its Application to Subscription Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions.
IACR Cryptol. ePrint Arch., 2014

Chosen Ciphertext Security via Point Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
Proceedings of the Provable Security - 8th International Conference, 2014

A Short Fail-Stop Signature Scheme from Factoring.
Proceedings of the Provable Security - 8th International Conference, 2014

Chosen Ciphertext Security via UCE.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the Security of Pseudorandomized Information-Theoretically Secure Schemes.
IEEE Trans. Inf. Theory, 2013

Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2013

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length.
Proceedings of the Information Security, 16th International Conference, 2013

Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

A group signature scheme with unbounded message-dependent opening.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

On the properties of public key encryption from group signatures.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptol. ePrint Arch., 2012

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Space Efficient Signature Schemes from the RSA Assumption.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Ciphertext Policy Multi-dimensional Range Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Sequential Bitwise Sanitizable Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Applications of Signcryption.
Proceedings of the Practical Signcryption, 2010

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Efficient Provider Authentication for Bidirectional Broadcasting Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptol. ePrint Arch., 2010

Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Generic Constructions of Parallel Key-Insulated Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Proceedings of the Provable Security - 4th International Conference, 2010

Efficient Broadcast Encryption with Personalized Messages.
Proceedings of the Provable Security - 4th International Conference, 2010

A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010

Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Proceedings of the Advances in Information and Computer Security, 2010

Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010

Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Proceedings of the Topics in Cryptology, 2010

2009
A Trade-off Traitor Tracing Scheme.
IEICE Trans. Inf. Syst., 2009

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions.
IEICE Trans. Inf. Syst., 2009

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009

A generic construction of useful client puzzles.
Proceedings of the 2009 ACM Symposium on Information, 2009

On the Theoretical Gap between Group Signatures with and without Unlinkability.
Proceedings of the Progress in Cryptology, 2009

2008
Introduction to the Special Issue on Information Theoretic Security.
IEEE Trans. Inf. Theory, 2008

Invisibly Sanitizable Digital Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008

Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008

Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Proceedings of the Advances in Information and Computer Security, 2008

A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.
Proceedings of the Progress in Cryptology, 2008

Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

An Efficient Strong Key-Insulated Signature Scheme and Its Application.
Proceedings of the Public Key Infrastructure, 2008

2007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Trans. Inf. Syst., 2007

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Practical Provider Authentication System for Bidirectional Broadcast Service.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Anonymous Authentication Scheme for Subscription Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Trade-Off Traitor Tracing.
Proceedings of the Progress in Cryptology, 2007

Unconditionally Secure Chaffing-and-Winnowing for Multiple Use.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Orthogonality between Key Privacy and Data Privacy, Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Bounded CCA2-Secure Encryption.
Proceedings of the Advances in Cryptology, 2007

2006
Relations among Notions of Security for Identity Based Encryption Schemes.
Inf. Media Technol., 2006

A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.
IACR Cryptol. ePrint Arch., 2006

Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J., 2006

Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Proceedings of the Progressin Cryptology, 2006

Parallel Key-Insulated Public Key Encryption.
Proceedings of the Public Key Cryptography, 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

Digitally signed document sanitizing scheme based on bilinear maps.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Applying Fujisaki-Okamoto to Identity-Based Encryption.
Proceedings of the Applied Algebra, 2006

Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006

A Short Random Fingerprinting Code Against a Small Number of Pirates.
Proceedings of the Applied Algebra, 2006

2005
How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2005

A secure traitor tracing scheme against key exposure.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Unconditionally secure signatures and its related schemes.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Efficient Unconditionally Secure Digital Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
IACR Cryptol. ePrint Arch., 2004

On the Security of Cryptosystems with All-or-Nothing Transform.
Proceedings of the Applied Cryptography and Network Security, 2004

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
IACR Cryptol. ePrint Arch., 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

The Role of Arbiters in Asymmetric Authentication Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

Separating Encryption and Key Issuance in Digital Rights Management Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Traitor Traceable Conference System with Dynamic Sender.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Traceability Schemes for Signed Documents.
Proceedings of the Information Security, 5th International Conference, 2002

Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Security Notions for Unconditionally Secure Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Proceedings of the Public Key Cryptography, 2001

Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Proceedings of the Topics in Cryptology, 2001

2000
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
Proceedings of the Information Security, Third International Workshop, 2000

Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Proceedings of the Advances in Cryptology, 2000

1999
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Information Security, Second International Workshop, 1999

Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999

An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999

1998
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...