Hiroaki Anada

Orcid: 0000-0002-4472-0662

According to our database1, Hiroaki Anada authored at least 42 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Theoretical Analysis of Serial/Parallel Variations of Hash-Mining for Smaller Variance of Confirmation Time.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing.
Int. J. Netw. Comput., 2023

Finsler Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Accountable Ring Signatures from Symmetric-Key Primitives.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

2022
Group Signatures with Designated Traceability over Openers' Attributes.
Int. J. Netw. Comput., 2022

Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Group Signatures with Equality Test on Signers.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing.
ACM Trans. Internet Techn., 2021

Anonymous Deniable Predicate Authentication Scheme with Revocability.
J. Internet Serv. Inf. Secur., 2021

Group Signatures with Designated Traceability.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs.
J. Internet Serv. Inf. Secur., 2020

Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020

Security Reconsideration and Efficiency Evaluation of Decentralized Multi-authority Anonymous Authentication Scheme.
Proceedings of the IEEE International Conference on Smart Computing, 2020

Approach to Cryptography from Differential Geometry with Example.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Quantum Security and Implementation Evaluation of Non-adaptive Group-Testing Aggregate Message Authentication Codes.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019

Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2019

Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
Witness-Indistinguishable Arguments with Σ-Protocols for Bundled Witness Spaces and its Application to Global Identities.
IACR Cryptol. ePrint Arch., 2018

Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Detailed Instantiation of the Decentralized Multi-Authority Anonymous Authentication Scheme and Tighter Reduction for Security.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017

Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

Anonymous Authentication Scheme with Decentralized Multi-Authorities.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016

Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016

Expressive Rating Scheme by Signatures with Predications on Ratees.
Proceedings of the Network and System Security - 10th International Conference, 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

2015
Reset-Secure Identity-Based Identification Schemes Without Pairings.
Proceedings of the Provable Security, 2015

Application of NTRU Using Group Rings to Partial Decryption Technique.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015

Attribute-Based Two-Tier Signatures: Definition and Construction.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Attribute-Based Identification: Definitions and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Attribute-based signatures without pairings via the fiat-shamir paradigm.
Proceedings of the ASIAPKC'14, 2014

2012
Identification Schemes from Key Encapsulation Mechanisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2010
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Proceedings of the Provable Security - 4th International Conference, 2010


  Loading...