Hanaoka Goichiro Goichiro Hanaoka

ID:9000004797014

National Institute of Advanced Industrial Science and Technology (AIST) (2011年 CiNii収録論文より)

Search authors sharing the same name

Articles:  1-20 of 36

  • 1 / 2
  • Secure Broadcast System with Simultaneous Individual Messaging

    FUJII Arisa , OHTAKE Go , HANAOKA Goichiro , ATTRAPADUNG Nuttapong , WATANABE Hajime , OGAWA Kazuto , IMAI Hideki

    Broadcasters transmit TV programs and often need to transmit an individual message, e.g. an individual contract, to each user. The programs have to be encrypted in order to protect the copyright and t …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 94(6), 1328-1337, 2011-06-01

    J-STAGE  References (17) Cited by (1)

  • Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data

    DOWSLEY Rafael , MULLER-QUADE Jorn , OTSUKA Akira , HANAOKA Goichiro , IMAI Hideki , NASCIMENTO Anderson C. A.

    This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data pre-distributed by a trusted authority. As an application of this VSS scheme …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 94(2), 725-734, 2011-02-01

    J-STAGE  References (35)

  • Efficient Provider Authentication for Bidirectional Broadcasting Service

    OHTAKE Go , HANAOKA Goichiro , OGAWA Kazuto

    Provider authentication is necessary in bidirectional broadcasting services, and a digital signature scheme is often used to prevent an adversary from attempting impersonation. The cost of secure sign …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 93(6), 1039-1051, 2010-06-01

    J-STAGE  References (16) Cited by (1)

  • A Trade-off Traitor Tracing Scheme

    OHTAKE Go , OGAWA Kazuto , HANAOKA Goichiro , IMAI Hideki

    There has been a wide-ranging discussion on the issue of content copyright protection in digital content distribution systems. Fiat and Tassa proposed the framework of <i>dynamic traitor tracing …

    IEICE Transactions on Information and Systems 92(5), 859-875, 2009-05-01

    J-STAGE  References (21)

  • Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions

    CUI Yang , FUJISAKI Eiichiro , HANAOKA Goichiro , IMAI Hideki , ZHANG Rui

    In a seminal paper of identity based encryption (IBE), Boneh and Franklin [6] mentioned an interesting transform from an IBE scheme to a signature scheme, which was observed by Moni Naor. In this pape …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 92(1), 53-66, 2009-01-01

    J-STAGE  References (30) Cited by (1)

  • A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions

    MATSUDA Takahiro , ATTRAPADUNG Nuttapong , HANAOKA Goichiro , MATSUURA Kanta , IMAI Hideki

    Unforgeability of digital signatures is closely related to the security of hash functions since hashing messages, such as <i>hash-and-sign</i> paradigm, is necessary in order to sign (arbi …

    IEICE Transactions on Information and Systems 91(5), 1466-1476, 2008-05-01

    J-STAGE  References (30)

  • Extension of Broadcasting Service by Using Electronic Tokens

    OGAWA Kazuto , HANAOKA Goichiro , IMAI Hideki

    In the current broadcasting system or Internet content distribution system, content providers distribute decoders (STB) that contain secret keys for content decryption, prior to content distribution. …

    IEICE transactions on information and systems 90(11), 1741-1750, 2007-11-01

    References (15)

  • Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs

    PHAN Thi Lan Anh , HANAOKA Goichiro , MATSUURA Kanta , IMAI Hideki

    To deal with the problem of secret key exposure, Dodis, Katz, Xu and Yung proposed a key-insulated public key encryption (KIE), which uses the secure helper key to update the secret key more often and …

    IEICE transactions on fundamentals of electronics, communications and computer sciences 90(9), 1814-1829, 2007-09-01

    References (14)

  • Efficient Identity -Based Encryption with Tight Security Reduction

    ATTRAPADUNG Nuttapong , FURUKAWA Jun , GOMI Takeshi , HANAOKA Goichiro , IMAI Hideki , ZHANG Rui

    In this paper, we present an efficient variant of the Boneh-Franklin scheme that achieves a tight security reduction. Our scheme is basically an IBE scheme under two keys, one of which is randomly cho …

    IEICE Trans. Fundamentals, A 90(9), 1803-1813, 2007-09-01

    References (24) Cited by (1)

  • Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service

    OGAWA Kazuto , HANAOKA Goichiro , IMAI Hideki

    Copyright protection is a major issue in distributing content on Internet or broadcasting service. One well-known method of protecting copyright is a traitor tracing scheme. With this scheme, if a pir …

    IEICE Trans. Fund., A 90(5), 1000-1011, 2007-05-01

    References (16) Cited by (2)

  • A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key

    PHAN Thi Lan Anh , HANAOKA Goichiro , MATSUURA Kanta , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 29(2), 477-480, 2006-11-28

    References (14)

  • Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption

    YANG Peng , KITAGAWA Takashi , HANAOKA Goichiro , ZHANG Rui , WATANABE Hajime , MATSUURA Kanta , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 29(2), 469-472, 2006-11-28

    References (10)

  • Relations among Notions of Security for Identity Based Encryption Schemes

    Peng Yang , Goichiro Hanaoka , Yang Cui , Rui Zhang , Nuttapong Attrapadung , Kanta Matsuura , Hideki Imai

    Identity based encryption (Ιβε) schemes have been flourishing since the very beginning of this century. In Ιβε, proving the security of a scheme in the sense of IND-ID-CCA2 is widely believed to be su …

    IPSJ journal 47(8), 2417-2429, 2006-08-15

    IPSJ  References (17) Cited by (1)

  • The MAC-based Construction of Strong Multiple Encryption

    CUI Yang , KOBARA Kazukuni , HANAOKA Goichiro , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 28(1), 279-282, 2005-11-20

    References (18)

  • Towards Security Enhancement with Efficient Reduction for Identity Based Encryption

    YANG Peng , KITAGAWA Takashi , HANAOKA Goichiro , ZHANG Rui , MATSUURA Kanta , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 28(1), 165-166, 2005-11-20

    References (9)

  • CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption

    GOMI Takeshi , ATTRAPADUNG Nuttapong , FURUKAWA Jun , ZHANG Rui , HANAOKA Goichiro , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 28(1), 159-162, 2005-11-20

    References (10)

  • Unconditionally Secure Chaffing-and-Winnowing

    HANAOKA Goichiro , HANAOKA Yumiko , HAGIWARA Manabu , WATANABE Hajime , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 28(1), 41-44, 2005-11-20

    References (19)

  • A Remark on GEM

    ZHANG Rui , HANAOKA Goichiro , IMAI Hideki

    We study the necessary assumptions for a class of asymmetric encryption schemes acquired by applying GEM (Generic Chosen-Ciphertext Secure Encryption Method). The original security proof of GEM was gi …

    IEICE technical report. Information theory 105(85), 35-40, 2005-05-20

    References (15)

  • ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)

    ATTRAPADUNG Nuttapong , HANAOKA Goichiro , KOBARA Kazukuni , IMAI Hideki

    情報理論とその応用シンポジウム予稿集 = The proceedings of the Symposium on Information Theory and Its Applications 27(1), 219-222, 2004-12-14

    References (17)

  • Personal Entropy from Graphical Passwords : Methods for Quantification and Practical Key Generation

    AKAO Masato , YAMANAKA Shinji , HANAOKA Goichiro , IMAI Hideki

    In many cryptosystems incorporating human beings, the users' limited memories and their indifference to keeping the systems secure may cause some severe vulnerability of the whole systems. Thus we nee …

    IEICE transactions on fundamentals of electronics, communications and computer sciences 87(10), 2543-2554, 2004-10-01

    References (21)

  • 1 / 2
Page Top