Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Goichiro Hanaoka
Search web for home page
Program Committees
1
2013
PKC
general chair
2
2009
Asiacrypt
pc
3
2004
PKC
pc
Publications
year
title
booktitle
pages
1
2012
Space Efficient Signature Schemes from the RSA Assumption
pkc
102-119
2
2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
pkc
243-261
3
2012
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
pkc
715-732
4
2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
pkc
595-608
5
2012
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms
pkc
576-594
6
2012
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
crypto
812-831
7
2011
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
pkc
71
8
2011
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010
pkc
284
9
2010
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
eprint
online
10
2010
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
eprint
online
11
2008
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
asiacrypt
308-325
12
2008
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
eprint
online
13
2007
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
eprint
online
14
2007
Bounded CCA2-Secure Encryption
asiacrypt
502-518
15
2006
Parallel Key-Insulated Public Key Encryption
pkc
online
16
2006
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries
eprint
online
17
2005
Relations Among Notions of Security for Identity Based Encryption Schemes
eprint
online
18
2005
Efficient Identity-Based Encryption with Tight Security Reduction
eprint
online
19
2005
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
asiacrypt
online
20
2004
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
eprint
online
21
2004
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
pkc
online
22
2003
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
eprint
online
23
2002
Unconditionally Secure Anonymous Encryption and Group Authentication
asiacrypt
online
24
2002
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
pkc
64-79
25
2002
Security Notions for Unconditionally Secure Signature Schemes
eurocrypt
online
26
2001
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
pkc
225-239
27
2000
Unconditionally Secure Digital Signature Schemes Admitting Transferability
asiacrypt
130-142
28
1999
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks
asiacrypt
348-362
Coauthors of Goichiro Hanaoka
Nuttapong Attrapadung
Benoît Chevallier-Mames
Ronald Cramer
Yang Cui
Keita Emura
Eiichiro Fujisaki
Jun Furukawa
Takeshi Gomi
Yumiko Hanaoka
Dennis Hofheinz
Hideki Imai
Tetsuya Izu
Eike Kiltz
Hirotaka Komaki
Noboru Kunihiro
Kaoru Kurosawa
Takahiro Matsuda
Kanta Matsuura
Tsuyoshi Nishioka
Koji Nuida
Kazuo Ohta
Rafael Pass
Yusuke Sakai
Yumi Sakemi
Bagus Santoso
Jacob C. N. Schuldt
Abhi Shelat
Junji Shikata
Masahiko Takenaka
Vinod Vaikuntanathan
Yuji Watanabe
Jian Weng
Shota Yamada
Peng Yang
Masaya Yasuda
Rui Zhang
Yunlei Zhao
Yuliang Zheng