Hanaoka Goichiro
Hanaoka Goichiro
Unknown affiliation
No verified email
Cited by
Cited by
Identity-based hierarchical strongly key-insulated encryption and its application
Y Hanaoka, G Hanaoka, J Shikata, H Imai
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
Digitally signed document sanitizing scheme based on bilinear maps
K Miyazaki, G Hanaoka, H Imai
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
G Hanaoka, K Kurosawa
International Conference on the Theory and Application of Cryptology and …, 2008
Parallel key-insulated public key encryption
G Hanaoka, Y Hanaoka, H Imai
Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
Unconditionally secure digital signature schemes admitting transferability
G Hanaoka, J Shikata, Y Zheng, H Imai
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
A framework for identity-based encryption with almost tight security
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
On the security of the schnorr signature scheme and DSA against related-key attacks
H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
Attribute-based signatures for circuits from bilinear map
Y Sakai, N Attrapadung, G Hanaoka
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
Efficient asymmetric public-key traitor tracing without trusted agents
Y Watanabe, G Hanaoka, H Imai
Cryptographers’ Track at the RSA Conference, 392-407, 2001
On the security of multiple encryption or CCA-security+ CCA-security= CCA-security?
R Zhang, G Hanaoka, J Shikata, H Imai
International Workshop on Public Key Cryptography, 360-374, 2004
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
Signature schemes with a fuzzy private key
K Takahashi, T Matsuda, T Murakami, G Hanaoka, M Nishigaki
International Journal of Information Security 18, 581-617, 2019
Security notions for unconditionally secure signature schemes
J Shikata, G Hanaoka, Y Zheng, H Imai
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20