Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Goichiro Hanaoka - MaRDI portal

Goichiro Hanaoka

From MaRDI portal
Person:278730

Available identifiers

zbMath Open hanaoka.goichiroWikidataQ86929914 ScholiaQ86929914MaRDI QIDQ278730

List of research outcomes

PublicationDate of PublicationType
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition2022-12-22Paper
On Private Information Retrieval Supporting Range Queries2022-12-22Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019-10-18Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures2018-11-26Paper
Token-based multi-input functional encryption2018-11-07Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data2018-10-24Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2018-10-17Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem2018-05-16Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
Secure grouping protocol using a deck of cards2018-03-16Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Towards user-friendly cryptography2017-10-23Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2017-06-08Paper
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones2017-01-06Paper
Size-Hiding Computation for Multiple Parties2017-01-06Paper
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2017-01-06Paper
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security2016-12-19Paper
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli2016-10-27Paper
Attribute-Based Encryption for Range Attributes2016-10-21Paper
Signatures Resilient to Uninvertible Leakage2016-10-21Paper
Fuzzy Signatures: Relaxing Requirements and a New Construction2016-10-04Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information2016-09-02Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2016-06-10Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks2016-05-19Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016-04-13Paper
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016-04-13Paper
Attribute-Based Signatures for Circuits from Bilinear Map2016-04-13Paper
A Signature Scheme with a Fuzzy Private Key2016-03-10Paper
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption2016-03-02Paper
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption2016-03-02Paper
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model2016-01-27Paper
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards2016-01-27Paper
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions2015-10-20Paper
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions2015-09-29Paper
A Short Fail-Stop Signature Scheme from Factoring2015-09-29Paper
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks2015-09-11Paper
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms2015-07-06Paper
More Constructions of Re-splittable Threshold Public Key Encryption2015-05-27Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption2014-09-15Paper
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption2014-08-21Paper
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications2014-08-07Paper
All-but-One Dual Projective Hashing and Its Applications2014-07-07Paper
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List2014-07-07Paper
Chosen Ciphertext Security via UCE2014-03-25Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Chosen Ciphertext Security via Point Obfuscation2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013-04-19Paper
Group Signatures with Message-Dependent Opening2013-04-04Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012-09-25Paper
Space Efficient Signature Schemes from the RSA Assumption2012-07-20Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012-07-20Paper
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve2012-07-20Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More2012-06-08Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
Towards Restricting Plaintext Space in Public Key Encryption2011-11-10Paper
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks2011-06-28Paper
Applications of Signcryption2011-05-18Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 20102011-03-15Paper
Efficient Broadcast Encryption with Personalized Messages2010-10-12Paper
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption2010-10-12Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2010-09-29Paper
An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes2010-09-29Paper
Generic Constructions of Parallel Key-Insulated Encryption2010-09-10Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness2010-03-16Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
The Role of Arbiters in Asymmetric Authentication Schemes2010-02-09Paper
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use2009-12-03Paper
On the Theoretical Gap between Group Signatures with and without Unlinkability2009-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
Orthogonality between Key Privacy and Data Privacy, Revisited2009-02-10Paper
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption2009-02-10Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction2009-01-09Paper
Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)2009-01-09Paper
Relations Among Notions of Security for Identity Based Encryption Schemes2008-09-18Paper
An Efficient Strong Key-Insulated Signature Scheme and Its Application2008-06-12Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Formal Security Treatments for Signatures from Identity-Based Encryption2008-06-10Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Trade-Off Traitor Tracing2008-04-11Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2008-03-18Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT2007-09-07Paper
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service2007-09-07Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44724182004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44507682004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283312003-09-15Paper
Unconditionally Secure Anonymous Encryption and Group Authentication2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084442003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q27245982002-11-04Paper
https://portal.mardi4nfdi.de/entity/Q27244582002-09-01Paper
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks2002-08-28Paper
https://portal.mardi4nfdi.de/entity/Q49453912002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45025132002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q49450442000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q38391791998-08-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Goichiro Hanaoka