Goichiro Hanaoka

According to our database1, Goichiro Hanaoka authored at least 229 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Transactions, 2020

Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model.
IEICE Transactions, 2020

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Transactions, 2020

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Transactions, 2020

A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Transactions, 2020

2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019

Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Security and Communication Networks, 2019

Signature schemes with a fuzzy private key.
Int. J. Inf. Sec., 2019

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Transactions, 2019

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Transactions, 2019

A New Combiner for Key Encapsulation Mechanisms.
IEICE Transactions, 2019

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
IEICE Transactions, 2019

Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
IACR Cryptology ePrint Archive, 2019

Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions.
IACR Cryptology ePrint Archive, 2019

MOBIUS: Model-Oblivious Binarized Neural Networks.
IEEE Access, 2019

An Extended CTRT for AES-256.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions.
Proceedings of the Advances in Information and Computer Security, 2019

2018
Practical attribute-based signature schemes for circuits from bilinear map.
IET Information Security, 2018

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
IEICE Transactions, 2018

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening.
IEICE Transactions, 2018

More Constructions of Re-Splittable Threshold Public Key Encryption.
IEICE Transactions, 2018

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Transactions, 2018

Secure Grouping Protocol Using a Deck of Cards.
IEICE Transactions, 2018

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Transactions, 2018

Attribute-Based Encryption for Range Attributes.
IEICE Transactions, 2018

Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map.
IACR Cryptology ePrint Archive, 2018

Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties.
IACR Cryptology ePrint Archive, 2018

Memory Lower Bounds of Reductions Revisited.
IACR Cryptology ePrint Archive, 2018

Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem.
IACR Cryptology ePrint Archive, 2018

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
IACR Cryptology ePrint Archive, 2018

Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.
Des. Codes Cryptogr., 2018

Fully Anonymous Group Signature with Verifier-Local Revocation.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Embedding Lemmas for Functional Encryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the Security of Linear Sketch Schemes against Recovering Attacks.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Compact public key encryption without full random oracles.
Pervasive and Mobile Computing, 2017

A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
IJACT, 2017

Private Similarity Searchable Encryption for Euclidean Distance.
IEICE Transactions, 2017

Card-Based Protocols Using Regular Polygon Cards.
IEICE Transactions, 2017

Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Transactions, 2017

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Transactions, 2017

On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Transactions, 2017

On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
IEICE Transactions, 2017

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack.
IEICE Transactions, 2017

Group Signature with Deniability: How to Disavow a Signature.
IEICE Transactions, 2017

Signatures from Trapdoor Commitments with Strong Openings.
IEICE Transactions, 2017

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security.
IEICE Transactions, 2017

A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptology ePrint Archive, 2017

Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Algorithmica, 2017

Key Management for Versatile Pay-TV Services.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Survey on Identity-Based Encryption from Lattices.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

A limitation on security evaluation of cryptographic primitives with fixed keys.
Security and Communication Networks, 2016

Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Security and Communication Networks, 2016

Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions.
JIP, 2016

Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

Secure Computation Protocols Using Polarizing Cards.
IEICE Transactions, 2016

Convertible Nominative Signatures from Standard Assumptions without Random Oracles.
IEICE Transactions, 2016

Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
IACR Cryptology ePrint Archive, 2016

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptology ePrint Archive, 2016

How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptology ePrint Archive, 2016

Attribute-Based Signatures for Circuits from Bilinear Map.
IACR Cryptology ePrint Archive, 2016

On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.
IACR Cryptology ePrint Archive, 2016

Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security.
IACR Cryptology ePrint Archive, 2016

Signatures Resilient to Uninvertible Leakage.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Towards User-Friendly Cryptography.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Committed AND protocol using three cards with more handy shuffle.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On signatures with tight security in the multi-user setting.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Size-Hiding Computation for Multiple Parties.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

Fuzzy Signatures: Relaxing Requirements and a New Construction.
Proceedings of the Applied Cryptography and Network Security, 2016

Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Disavowable Public Key Encryption with Non-Interactive Opening.
IEICE Transactions, 2015

Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptology ePrint Archive, 2015

On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks.
IACR Cryptology ePrint Archive, 2015

A Framework for Identity-Based Encryption with Almost Tight Security.
IACR Cryptology ePrint Archive, 2015

An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption.
IACR Cryptology ePrint Archive, 2015

Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms.
IACR Cryptology ePrint Archive, 2015

Conversions among Several Classes of Predicate Encryption and Their Applications.
IACR Cryptology ePrint Archive, 2015

Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Content and Key Management to Trace Traitors in Broadcasting Services.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Proceedings of the SECRYPT 2015, 2015

Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015

Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data.
Proceedings of the Advances in Information and Computer Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015

Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.
Proceedings of the Topics in Cryptology, 2015

Constructions of Fail-Stop Signatures for Multi-signer Setting.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

A Signature Scheme with a Fuzzy Private Key.
Proceedings of the Applied Cryptography and Network Security, 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Weakened Anonymity of Group Signature and Its Application to Subscription Services.
IEICE Transactions, 2014

A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2014

Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions.
IACR Cryptology ePrint Archive, 2014

Chosen Ciphertext Security via Point Obfuscation.
IACR Cryptology ePrint Archive, 2014

Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
Proceedings of the Provable Security - 8th International Conference, 2014

A Short Fail-Stop Signature Scheme from Factoring.
Proceedings of the Provable Security - 8th International Conference, 2014

Chosen Ciphertext Security via UCE.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

All-but-One Dual Projective Hashing and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the Security of Pseudorandomized Information-Theoretically Secure Schemes.
IEEE Trans. Information Theory, 2013

Methods for Restricting Message Space in Public-Key Encryption.
IEICE Transactions, 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
IACR Cryptology ePrint Archive, 2013

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length.
Proceedings of the Information Security, 16th International Conference, 2013

Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

A group signature scheme with unbounded message-dependent opening.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

On the properties of public key encryption from group signatures.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptology ePrint Archive, 2012

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
IACR Cryptology ePrint Archive, 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Space Efficient Signature Schemes from the RSA Assumption.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Ciphertext Policy Multi-dimensional Range Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness.
IEICE Transactions, 2011

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Transactions, 2011

Sequential Bitwise Sanitizable Signature Schemes.
IEICE Transactions, 2011

Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Transactions, 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Transactions, 2011

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Applications of Signcryption.
Proceedings of the Practical Signcryption, 2010

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency.
IEICE Transactions, 2010

Efficient Provider Authentication for Bidirectional Broadcasting Service.
IEICE Transactions, 2010

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption.
IEICE Transactions, 2010

Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptology ePrint Archive, 2010

Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Generic Constructions of Parallel Key-Insulated Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Proceedings of the Provable Security - 4th International Conference, 2010

Efficient Broadcast Encryption with Personalized Messages.
Proceedings of the Provable Security - 4th International Conference, 2010

A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010

Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Proceedings of the Advances in Information and Computer Security, 2010

Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010

Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Proceedings of the Topics in Cryptology, 2010

2009
A Trade-off Traitor Tracing Scheme.
IEICE Transactions, 2009

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions.
IEICE Transactions, 2009

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Transactions, 2009

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.
IACR Cryptology ePrint Archive, 2009

An Improvement of Pseudorandomization against Unbounded Attack Algorithms - The Case of Fingerprint Codes.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009

A generic construction of useful client puzzles.
Proceedings of the 2009 ACM Symposium on Information, 2009

On the Theoretical Gap between Group Signatures with and without Unlinkability.
Proceedings of the Progress in Cryptology, 2009

2008
Introduction to the Special Issue on Information Theoretic Security.
IEEE Trans. Information Theory, 2008

Invisibly Sanitizable Digital Signature Scheme.
IEICE Transactions, 2008

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Transactions, 2008

Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
IACR Cryptology ePrint Archive, 2008

Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Proceedings of the Advances in Information and Computer Security, 2008

A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.
Proceedings of the Progress in Cryptology, 2008

Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

An Efficient Strong Key-Insulated Signature Scheme and Its Application.
Proceedings of the Public Key Infrastructure, 2008

2007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Transactions, 2007

Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Transactions, 2007

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Transactions, 2007

Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Transactions, 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Practical Provider Authentication System for Bidirectional Broadcast Service.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Anonymous Authentication Scheme for Subscription Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Trade-Off Traitor Tracing.
Proceedings of the Progress in Cryptology, 2007

Unconditionally Secure Chaffing-and-Winnowing for Multiple Use.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Orthogonality between Key Privacy and Data Privacy, Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Bounded CCA2-Secure Encryption.
Proceedings of the Advances in Cryptology, 2007

2006
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.
IACR Cryptology ePrint Archive, 2006

Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J., 2006

Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Proceedings of the Progressin Cryptology, 2006

Parallel Key-Insulated Public Key Encryption.
Proceedings of the Public Key Cryptography, 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

Digitally signed document sanitizing scheme based on bilinear maps.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Applying Fujisaki-Okamoto to Identity-Based Encryption.
Proceedings of the Applied Algebra, 2006

Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006

A Short Random Fingerprinting Code Against a Small Number of Pirates.
Proceedings of the Applied Algebra, 2006

2005
How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Transactions, 2005

Relations Among Notions of Security for Identity Based Encryption Schemes.
IACR Cryptology ePrint Archive, 2005

Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptology ePrint Archive, 2005

A secure traitor tracing scheme against key exposure.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Unconditionally secure signatures and its related schemes.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions, 2004

Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Transactions, 2004

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
IACR Cryptology ePrint Archive, 2004

On the Security of Cryptosystems with All-or-Nothing Transform.
Proceedings of the Applied Cryptography and Network Security, 2004

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
IACR Cryptology ePrint Archive, 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

The Role of Arbiters in Asymmetric Authentication Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

Separating Encryption and Key Issuance in Digital Rights Management Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Traceability Schemes for Signed Documents.
Proceedings of the Information Security, 5th International Conference, 2002

Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Security Notions for Unconditionally Secure Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Proceedings of the Public Key Cryptography, 2001

Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Proceedings of the Topics in Cryptology, 2001

2000
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
Proceedings of the Information Security, Third International Workshop, 2000

Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Proceedings of the Advances in Cryptology, 2000

1999
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Information Security, Second International Workshop, 1999

Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999

An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999

1998
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998


  Loading...