Cryptographers' World
 

Goichiro Hanaoka



17 papers in database with 270 citations Star

H-number: 11

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Goichiro Hanaoka,  Kaoru Kurosawa,  Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, pp. 308 - 325, ASIACRYPT 2008.

[Electronic Edition][Cited 31 times ]

2. Jun Furukawa,  Nuttapong Attrapadung,  Ryuichi Sakai,  Goichiro Hanaoka,  A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, pp. 116 - 129, INDOCRYPT 2008.

[Electronic Edition][Cited 2 times ]

3. Kazuto Ogawa,  Go Ohtake,  Goichiro Hanaoka,  Hideki Imai,  Trade-Off Traitor Tracing, pp. 331 - 340, INDOCRYPT 2007.

[Electronic Edition][Cited 1 times ]

4. Ronald Cramer,  Goichiro Hanaoka,  Dennis Hofheinz,  Hideki Imai,  Eike Kiltz,  Rafael Pass,  Abhi Shelat,  Vinod Vaikuntanathan,  Bounded CCA2-Secure Encryption, pp. 502 - 518, ASIACRYPT 2007.

[Electronic Edition][Cited 16 times ]

5. Thi Lan Anh Phan,  Yumiko Hanaoka,  Goichiro Hanaoka,  Kanta Matsuura,  Hideki Imai,  Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption, pp. 366 - 384, VIETCRYPT 2006.

[Electronic Edition][Cited 5 times ]

6. Goichiro Hanaoka,  Yumiko Hanaoka,  Hideki Imai,  Parallel Key-Insulated Public Key Encryption, pp. 105 - 122, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

7. Yumiko Hanaoka,  Goichiro Hanaoka,  Junji Shikata,  Hideki Imai,  Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, pp. 495 - 514, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

8. Rui Zhang,  Goichiro Hanaoka,  Hideki Imai,  On the Security of Cryptosystems with All-or-Nothing Transform, pp. 76 - 90, ACNS 2004.

[Electronic Edition][Cited 5 times ]

9. Anderson C. A. Nascimento,  J├Ârn M├╝ller-Quade,  Akira Otsuka,  Goichiro Hanaoka,  Hideki Imai,  Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model, pp. 355 - 368, ACNS 2004.

[Electronic Edition][Cited 3 times ]

10. Rui Zhang,  Goichiro Hanaoka,  Junji Shikata,  Hideki Imai,  On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, pp. 360 - 374, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

11. Goichiro Hanaoka,  Junji Shikata,  Yumiko Hanaoka,  Hideki Imai,  Unconditionally Secure Anonymous Encryption and Group Authentication, pp. 81 - 99, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

12. Junji Shikata,  Goichiro Hanaoka,  Yuliang Zheng,  Hideki Imai,  Security Notions for Unconditionally Secure Signature Schemes, pp. 434 - 449, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

13. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code, pp. 64 - 79, PKC 2002.

[Electronic Edition][Cited 6 times ]

14. Yuji Watanabe,  Goichiro Hanaoka,  Hideki Imai,  Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents, pp. 392 - 407, CT-RSA 2001.

[Electronic Edition][Cited 34 times ]

15. Hirotaka Komaki,  Yuji Watanabe,  Goichiro Hanaoka,  Hideki Imai,  Efficient Asymmetric Self-Enforcement Scheme with Public Traceability, pp. 225 - 239, PKC 2001.

[Electronic Edition][Cited 18 times ]

16. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Unconditionally Secure Digital Signature Schemes Admitting Transferability, pp. 130 - 142, ASIACRYPT 2000.

[Electronic Edition][Cited 25 times ]

17. Goichiro Hanaoka,  Tsuyoshi Nishioka,  Yuliang Zheng,  Hideki Imai,  An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks, pp. 348 - 362, ASIACRYPT 1999.

[Electronic Edition][Cited 25 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...