• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Hanaoka Goichiro  花岡 悟一郎

ORCIDConnect your ORCID iD *help
… Alternative Names

HANAOKA Goichiro  花岡 悟一郎

Less
Researcher Number 30415731
Other IDs
Affiliation (Current) 2020: 国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究チーム長
Affiliation (based on the past Project Information) *help 2020: 国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究グループ長
2018 – 2019: 国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究チーム長
2017 – 2018: 国立研究開発法人産業技術総合研究所, 情報・人間工学領域, 研究グループ長
2015 – 2016: 国立研究開発法人産業技術総合研究所, 情報技術研究部門, 研究グループ長
2015: 独立行政法人産業技術総合研究所, 研究グループ長 … More
2014: 独立行政法人産業技術総合研究所, 情報技術研究部門, 研究グループ長
2012 – 2014: 独立行政法人産業技術総合研究所, セキュアシステム研究部門, 研究グループ長
2011: 独立行政法人産業技術総合研究所, 情報セキュリティ研究センター, 研究チーム長 Less
Review Section/Research Field
Principal Investigator
Communication/Network engineering / Information security
Except Principal Investigator
Information security / Life / Health / Medical informatics / Medium-sized Section 60:Information science, computer engineering, and related fields
Keywords
Principal Investigator
暗号理論 / 公開鍵暗号 / ゼロ知識証明 / 証明可能安全性 / 選択暗号文攻撃 / 公開鍵暗号基盤 / 暗号・認証 / 暗号・認証等 / 暗号
Except Principal Investigator
暗号 … More / side-channel attack / public key encryption / cryptographic problem / security reduction / プライバシー保護 / 化合物検索 / アラインメント / 隠れマルコフモデル / PPDM / 配列アラインメント / 準同型暗号 / プライバシー / ゲノム / 化合物 / データベース検索 / 配列検索 / 鍵失効機能付きIDベース暗号 / 鍵失効機能付き属性ベース暗号 / 署名鍵有効期限付きグループ署名 / 鍵失効機能付きグループ署名 / 鍵失効可能IDベース暗号 / 鍵隔離公開鍵暗号 / 暗号理論 / 情報セキュリティ / プライバシ保護技術 / 高機能暗号 Less
  • Research Projects

    (6 results)
  • Research Products

    (54 results)
  • Co-Researchers

    (20 People)
  •  あらゆる高機能暗号方式の相互変換を可能にするアジャイルクリプト技術Ongoing

    • Principal Investigator
      Attrapadung Nuttapong
    • Project Period (FY)
      2019 – 2023
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      National Institute of Advanced Industrial Science and Technology
  •  Research on Advanced Key Update Technique for Practical Applications of Advanced Cryptosystem

    • Principal Investigator
      Keita Emura
    • Project Period (FY)
      2016 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      National Institute of Information and Communications Technology
  •  非理想的実装をも想定した暗号システムの設計と安全性評価Host Researcher

    • Host Researcher
      花岡 悟一郎
    • Project Period (FY)
      2014 – 2015
    • Research Category
      Grant-in-Aid for JSPS Fellows
    • Research Field
      Information security
    • Research Institution
      National Institute of Advanced Industrial Science and Technology
  •  Research on Cryptographic Primitives with Easily Verifiable SecurityPrincipal Investigator

    • Principal Investigator
      Hanaoka Goichiro
    • Project Period (FY)
      2014 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      National Institute of Advanced Industrial Science and Technology
  •  Development of basic technology for privacy-preserving bioinformatics and its application

    • Principal Investigator
      Hamada Michiaki
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Life / Health / Medical informatics
    • Research Institution
      Waseda University
      The University of Tokyo
  •  Study on Public Key Encryption with Restricted Plaintext SpacePrincipal Investigator

    • Principal Investigator
      HANAOKA Goichiro
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Communication/Network engineering
    • Research Institution
      National Institute of Advanced Industrial Science and Technology

All 2019 2018 2017 2016 2015 2014 2013 2012 2011 Other

All Journal Article Presentation

  • [Journal Article] A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions2019

    • Author(s)
      ATTRAPADUNG Nuttapong、HANAOKA Goichiro、KIYOMOTO Shinsaku、MIMOTO Tomoaki、C. N. SCHULDT Jacob
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E102.A Issue: 9 Pages: 1048-1060

    • DOI

      10.1587/transfun.e102.a.1048

      10.1587/transfun.E102.A.1048

    • NAID

      130007699467

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19H01109
  • [Journal Article] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption2019

    • Author(s)
      Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 101-A Issue: 9 Pages: 1456-1472

    • DOI

      10.1587/transfun.e101.a.1456

      10.1587/transfun.E101.A.1456

    • NAID

      130007479446

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H01705, KAKENHI-PROJECT-17H01695, KAKENHI-PROJECT-16K00198
  • [Journal Article] MOBIUS: Model-Oblivious Binarized Neural Networks2019

    • Author(s)
      Kitai Hiromasa、Hanaoka Goichiro、Cruz Jason Paul、Yanai Naoto、Nishida Naohisa、Oba Tatsumi、Unagami Yuji、Teruya Tadanori、Attrapadung Nuttapong、Matsuda Takahiro
    • Journal Title

      IEEE Access

      Volume: 7 Pages: 139021-139034

    • DOI

      10.1109/access.2019.2939410

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-19H01109
  • [Journal Article] Privacy-preserving search for chemical compound databases2015

    • Author(s)
      Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai
    • Journal Title

      BMC Bioinformatics

      Volume: 16(Suppl 18):S6 Pages: 1-14

    • DOI

      10.1186/1471-2105-16-s18-s6

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PLANNED-24106010, KAKENHI-PROJECT-25540131
  • [Journal Article] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 8383 Pages: 275-292

    • DOI

      10.1007/978-3-642-54631-0

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 8383 Pages: 275-292

    • DOI

      10.1007/978-3-642-54631-0_16

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] Group signature implies public-key encryption with non-interactive opening2014

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Journal Title

      Int. J. Inf. Sec

      Volume: E96-A(1) Pages: 1156-1168

    • DOI

      10.1007/s10207-013-0204-y

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-12J08733, KAKENHI-PROJECT-23656257
  • [Journal Article] All-but-One Dual Projective Hashing and Its Applications2014

    • Author(s)
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • Journal Title

      Lecture Notes in Computer Science Volume

      Volume: 8479 Pages: 181-198

    • DOI

      10.1007/978-3-319-07536-5_12

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-14F04205
  • [Journal Article] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7778 Pages: 332-351

    • DOI

      10.1007/978-3-642-36362-7_3

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-11J07003, KAKENHI-PROJECT-23656257
  • [Journal Article] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7778 Pages: 332-351

    • DOI

      10.1007/978-3-642-36362-7_21

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2013

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7,417 Pages: 812-831

    • DOI

      10.1007/978-3-642-32009-5_47

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-10F00506, KAKENHI-PROJECT-11J07003, KAKENHI-PROJECT-23656257
  • [Journal Article] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Sanotoso, Goichiro Hanaoka, Jacob C.N. Schuldt, and Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7,293 Pages: 243-261

    • DOI

      10.1007/978-3-642-30057-8_15

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-11J06283, KAKENHI-PROJECT-23656257
  • [Journal Article] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 576-594

    • DOI

      10.1007/978-3-642-30057-8_34

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 7,293 Pages: 102-119

    • DOI

      10.1007/978-3-642-30057-8_7

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-11J06283, KAKENHI-PROJECT-23656257
  • [Journal Article] How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model2011

    • Author(s)
      Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol. 94-EA(6) Issue: 6 Pages: 1293-1305

    • DOI

      10.1587/transfun.e94.a.1293

      10.1587/transfun.E94.A.1293

    • NAID

      10029802310

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] Towards Restricting Plaintext Space in Public Key Encryption2011

    • Author(s)
      Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7038 Pages: 193-209

    • DOI

      10.1007/978-3-642-25141-2_13

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Journal Article] On the Security of Dynamic Group Signatures : Preventing Signature Hijacking

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Journal Title

      Lecture Notes in Computer Science

      Volume: Vol. 7293 Pages: 715-732

    • DOI

      10.1007/978-3-642-30057-8_42

    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Memory Lower Bounds of Reductions Revisited2018

    • Author(s)
      Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      EUROCRYPT 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO2018

    • Author(s)
      Ai Ishida, Yusuke Sakai, Goichiro Hanaoka
    • Organizer
      ISITA 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening2018

    • Author(s)
      Yusuke Sakai, Goichiro Hanaoka
    • Organizer
      ISITA 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Attribute-Based Signatures for Unbounded Languages from Standard Assumptions2018

    • Author(s)
      Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka
    • Organizer
      ASIACRYPT 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption2018

    • Author(s)
      Junrichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      ISITA 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions2018

    • Author(s)
      Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      SCN 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Fully Anonymous Group Signature with Verifier-Local Revocation2018

    • Author(s)
      Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      SCN 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] 適応的安全な無効化可能属性ベース暗号の一般的構成2017

    • Author(s)
      山田古都子, アッタラパドゥン・ナッタポン, 江村 恵太, 花岡 悟一郎, 田中 圭介
    • Organizer
      暗号と情報セキュリティシンポジウム2017
    • Place of Presentation
      ロワジールホテル那覇, 沖縄県, 那覇市
    • Year and Date
      2017-01-24
    • Data Source
      KAKENHI-PROJECT-16K00198
  • [Presentation] Key Management for Versatile Pay-TV Services2017

    • Author(s)
      Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka
    • Organizer
      Security and Trust Management - 13th International Workshop, STM 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations2017

    • Author(s)
      Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka
    • Organizer
      Selected Areas in Cryptography - SAC 2017 - 24th International Conference
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Generic Constructions for Fully Secure Revocable Attribute-Based Encryption2017

    • Author(s)
      Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ESORICS 2017
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16K00198
  • [Presentation] Size-Hiding Computation for Multiple Parties2016

    • Author(s)
      Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    • Organizer
      ASIACRYPT 2016
    • Place of Presentation
      Hanoi, Vietnam
    • Year and Date
      2016-12-04
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      PKC 2016
    • Place of Presentation
      Taipei, Taiwan
    • Year and Date
      2016-03-06
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones2016

    • Author(s)
      Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ASIACRYPT 2016
    • Place of Presentation
      Hanoi, Vietnam
    • Year and Date
      2016-12-04
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Attribute-Based Encryption for Range Attributes2016

    • Author(s)
      Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
    • Organizer
      SCN 2016
    • Place of Presentation
      Amalfi, Italy
    • Year and Date
      2016-08-31
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2015

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      ASIACRYPT 2015
    • Place of Presentation
      Auckland, New Zealand
    • Year and Date
      2015-11-29
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model2015

    • Author(s)
      Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • Organizer
      Provable Security 2015
    • Place of Presentation
      Kanazawa, Japan
    • Year and Date
      2015-11-24
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-14F04205
  • [Presentation] Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2015

    • Author(s)
      Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
    • Organizer
      ASIACRYPT 2015
    • Place of Presentation
      Auckland, New Zealand
    • Year and Date
      2015-11-29
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      17th International Conference on Practice and Theory in Public Key Cryptography (PKC 2014)
    • Place of Presentation
      Buenos Aires, Argentina
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      Public Key Cryptography 2014
    • Place of Presentation
      Buenos Aires, Argentina
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013

    • Author(s)
      Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      16th International Conference on Practice and Theory in Public Key Cryptography (PKC 2013)
    • Place of Presentation
      奈良
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Privacy-preserving search for a chemical compound database2013

    • Author(s)
      Kana Shimizu, Hiromi Arai, Koji Nuida, Michiaki Hamada, Koji Tsuda, Jun Sakuma, Takatsugu Hirokawa, Goichiro Hanaoka, Kiyoshi Asai,
    • Organizer
      ISMB/ECCB 2013
    • Place of Presentation
      ベルリン、ドイツ
    • Data Source
      KAKENHI-PROJECT-25540131
  • [Presentation] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Organizer
      32nd Annual Cryptology Conference (CRYPTO 2012)
    • Place of Presentation
      Santa Barbara, CA, USA
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.2012

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] グループ署名の安全性について2012

    • Author(s)
      坂井 祐介, ヤコブ・シュルツ, 江村 恵太, 花岡 悟一郎, 太田 和夫
    • Organizer
      2012年 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      石川県, 金沢エクセルホテル東急
    • Year and Date
      2012-02-02
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012

    • Author(s)
      Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt
    • Organizer
      32nd Annual Cryptology Conference (CRYPTO 2012)
    • Place of Presentation
      Santa Barbara, CA, USA
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] On the Security of Dynamic Group Signatures : Preventing Signature Hijacking.2012

    • Author(s)
      Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo Ohta
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012

    • Author(s)
      Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Space Efficient Signature Schemes from the RSA Assumption2012

    • Author(s)
      Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
    • Organizer
      15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012)
    • Place of Presentation
      Darmstadt, Germany
    • Data Source
      KAKENHI-PROJECT-23656257
  • [Presentation] Compact Public Key Encryption with Minimum Ideal Property of Hash Functions

    • Author(s)
      Kazuki Yoneyama, Goichiro Hanaoka
    • Organizer
      ProvSec 2014
    • Place of Presentation
      Hong Kong
    • Year and Date
      2014-10-09 – 2014-10-10
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Black-Box Separations in the Non-Programmable Random Oracle Model: The Cases of Hash-and-Sign Signatures

    • Author(s)
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • Organizer
      SCIS2015 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉・福岡県北九州市小倉北区
    • Year and Date
      2015-01-20 – 2015-01-23
    • Invited
    • Data Source
      KAKENHI-PROJECT-14F04205
  • [Presentation] Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks

    • Author(s)
      Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
    • Organizer
      ICISC 2014
    • Place of Presentation
      Seoul
    • Year and Date
      2014-12-03 – 2014-12-05
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms

    • Author(s)
      Takahiro Matsuda, Goichiro Hanaoka
    • Organizer
      TCC 2015
    • Place of Presentation
      Warsaw
    • Year and Date
      2015-03-23 – 2015-03-25
    • Data Source
      KAKENHI-PROJECT-26280046
  • [Presentation] All-but-One Dual Projective Hashing and Its Applications

    • Author(s)
      Zongyang Zhang, Yu Chen , Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao
    • Organizer
      The 12th International Conference on Applied Cryptography and Network Security (ACNS 2014)
    • Place of Presentation
      SwissTech Convention Center・Lausanne・ Switzerland
    • Year and Date
      2014-06-10 – 2014-06-13
    • Data Source
      KAKENHI-PROJECT-14F04205
  • 1.  ATTRAPADUNG Nuttapong (40515300)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 14 results
  • 2.  NUIDA Koji (20435762)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 2 results
  • 3.  松田 隆宏 (60709492)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 8 results
  • 4.  Keita Emura (30597018)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 4 results
  • 5.  AFFELDT Reynald (40415641)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 6.  Hamada Michiaki (00596538)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 7.  Shimizu Kana (60367050)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 8.  Tsuda Koji (90357517)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 9.  Frith Martin (40462832)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 10.  Asai Kiyoshi (30356357)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 11.  吉田 真紀 (50335387)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 12.  松尾 真一郎 (20553960)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 13.  林 卓也 (70739995)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 14.  照屋 唯紀 (20636972)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 15.  坂井 祐介 (40750659)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 16.  山田 翔太 (70750834)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 17.  村上 隆夫 (80587981)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 18.  Schuldt Jacob (80750893)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 4 results
  • 19.  ZHANG ZONGYANG
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 8 results
  • 20.  田中 圭介
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results

URL: 

Are you sure that you want to connect your ORCID iD to this researcher?
* This action can be performed only by the researcher themselves.

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi