Goichiro HANAOKA


A New Combiner for Key Encapsulation Mechanisms
Goichiro HANAOKA Takahiro MATSUDA Jacob C. N. SCHULDT 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12  pp. 1668-1675
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
encryptionkey encapsulation mechanismscombiners
 Summary | Full Text:PDF

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shinsaku KIYOMOTO Tomoaki MIMOTO Jacob C. N. SCHULDT 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1048-1060
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secure two-party computationsemi-honest modelcomparison protocolsconversionsshared inputs/outputsencrypted inputs/outputs
 Summary | Full Text:PDF

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma OHARA Keita EMURA Goichiro HANAOKA Ai ISHIDA Kazuo OHTA Yusuke SAKAI 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1101-1117
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
group signaturerevocationscalability
 Summary | Full Text:PDF

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
Yutaka KAWAI Takahiro MATSUDA Takato HIRANO Yoshihiro KOSEKI Goichiro HANAOKA 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1  pp. 81-98
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Proxy Re-encryptionhomomorphic encryption
 Summary | Full Text:PDF

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
Seira HIDANO Takao MURAKAMI Shuichi KATSUMATA Shinsaku KIYOMOTO Goichiro HANAOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2665-2676
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Forensics and Risk Analysis
Keyword: 
black boxmodel inversiondata poisoningonline ML systems
 Summary | Full Text:PDF

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
Yusuke SAKAI Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2677-2687
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
Public-key encryption with non-interactive openingTag-KEM
 Summary | Full Text:PDF

More Constructions of Re-Splittable Threshold Public Key Encryption
Satsuya OHATA Takahiro MATSUDA Goichiro HANAOKA Kanta MATSUURA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1473-1483
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
threshold public key encryptionkey re-splittability
 Summary | Full Text:PDF

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
Kotoko YAMADA Nuttapong ATTRAPADUNG Keita EMURA Goichiro HANAOKA Keisuke TANAKA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1456-1472
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
revocable attribute-based encryptionpair encodingidentity-based revocationdoubly spatial encryption
 Summary | Full Text:PDF

Attribute-Based Encryption for Range Attributes
Nuttapong ATTRAPADUNG Goichiro HANAOKA Kazuto OGAWA Go OHTAKE Hajime WATANABE Shota YAMADA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1440-1455
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionrange attributegeneric construction
 Summary | Full Text:PDF

Secure Grouping Protocol Using a Deck of Cards
Yuji HASHIMOTO Kazumasa SHINAGAWA Koji NUIDA Masaki INAMURA Goichiro HANAOKA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1512-1524
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolpermutation
 Summary | Full Text:PDF

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points
Yuji HASHIMOTO Koji NUIDA Kazumasa SHINAGAWA Masaki INAMURA Goichiro HANAOKA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1503-1511
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolpermutation without fixed points
 Summary | Full Text:PDF

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack
Yukou KOBAYASHI Naoto YANAI Kazuki YONEYAMA Takashi NISHIDE Goichiro HANAOKA Kwangjo KIM Eiji OKAMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2991-3006
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password-based authenticated key exchange (PAKE)threshold cryptography
 Summary | Full Text:PDF | (Errata[Uploaded on January 1,2018])

Private Similarity Searchable Encryption for Euclidean Distance
Yuji UNAGAMI Natsume MATSUZAKI Shota YAMADA Nuttapong ATTRAPADUNG Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2319-2326
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity in Computation, Communication and Storage Systems)
Category: Operating system and network Security
Keyword: 
searchable encryptioninner product encryptionthe weighted Euclidean distance
 Summary | Full Text:PDF

Group Signature with Deniability: How to Disavow a Signature
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1825-1837
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
group signaturedeniabilitynon-interactive zero-knowledge proofbilinear map
 Summary | Full Text:PDF

Signatures from Trapdoor Commitments with Strong Openings
Goichiro HANAOKA Jacob C. N. SCHULDT 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1924-1931
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
signaturesgeneric constructiontrapdoor commitments
 Summary | Full Text:PDF

On the Security of Non-Interactive Key Exchange against Related-Key Attacks
Hiraku MORITA Jacob C.N. SCHULDT Takahiro MATSUDA Goichiro HANAOKA Tetsu IWATA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1910-1923
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
related-key attacksNon-Interactive Key ExchangeDiffie-Hellman key exchange scheme
 Summary | Full Text:PDF

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shota YAMADA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1882-1890
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Boneh-Boyen identity-based encryptiontight security reductionmulti-challenge security
 Summary | Full Text:PDF

Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Shota YAMADA Kohei KASAMATSU Takashi YAMAKAWA Hideki IMAI 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1846-1856
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionciphertext policywildcard
 Summary | Full Text:PDF

Card-Based Protocols Using Regular Polygon Cards
Kazumasa SHINAGAWA Takaaki MIZUKI Jacob C.N. SCHULDT Koji NUIDA Naoki KANAYAMA Takashi NISHIDE Goichiro HANAOKA Eiji OKAMOTO 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1900-1909
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolregular polygon cards
 Summary | Full Text:PDF

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 34-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor tracingcollusion attackcontent comparisonencodingwatermarkingc-secure code
 Summary | Full Text:PDF

On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks
Hiraku MORITA Jacob C.N. SCHULDT Takahiro MATSUDA Goichiro HANAOKA Tetsu IWATA 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 73-90
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
related-key attacksSchnorr signaturesDSAElGamal signatures.
 Summary | Full Text:PDF

Convertible Nominative Signatures from Standard Assumptions without Random Oracles
Goichiro HANAOKA Jacob SCHULDT 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1107-1121
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
user certificationnominative signaturesstandard model
 Summary | Full Text:PDF

Secure Computation Protocols Using Polarizing Cards
Kazumasa SHINAGAWA Takaaki MIZUKI Jacob C. N. SCHULDT Koji NUIDA Naoki KANAYAMA Takashi NISHIDE Goichiro HANAOKA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolspolarizing cardssecure computationboolean circuitsrecreational cryptography
 Summary | Full Text:PDF

Disavowable Public Key Encryption with Non-Interactive Opening
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2446-2455
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryption with non-interactive openingdisavowabilitynon-interactive zero-knowledge proof
 Summary | Full Text:PDF

Weakened Anonymity of Group Signature and Its Application to Subscription Services
Kazuto OGAWA Go OHTAKE Arisa FUJII Goichiro HANAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1240-1258
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
subscription serviceanonymitylinkabilityunlinkabilitygroup signature
 Summary | Full Text:PDF

Methods for Restricting Message Space in Public-Key Encryption
Yusuke SAKAI Keita EMURA Goichiro HANAOKA Yutaka KAWAI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1156-1168
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-key encryptionabuse detectionformat checking
 Summary | Full Text:PDF

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael DOWSLEY Jorn MULLER-QUADE Akira OTSUKA Goichiro HANAOKA Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 725-734
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
verifiable secret sharingdishonest majoritypre-distributed dataunconditional securityuniversal composable
 Summary | Full Text:PDF

Sequential Bitwise Sanitizable Signature Schemes
Goichiro HANAOKA Shoichi HIROSE Atsuko MIYAJI Kunihiko MIYAZAKI Bagus SANTOSO Peng YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 392-404
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturebitwise controlone-way permutationpseudorandom generator
 Summary | Full Text:PDF

An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
Bagus SANTOSO Kazuo OHTA Kazuo SAKIYAMA Goichiro HANAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 92-103
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Identification
Keyword: 
identification schemeRFIDzero-knowledgeimpersonation
 Summary | Full Text:PDF

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro HANAOKA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 1994-2006
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securityDiffie-Hellman assumption
 Summary | Full Text:PDF

Efficient Provider Authentication for Bidirectional Broadcasting Service
Go OHTAKE Goichiro HANAOKA Kazuto OGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1039-1051
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
bidirectional broadcasting serviceprovider authenticationpersonal information protectionkey leakagestrong key-insulated signature
 Summary | Full Text:PDF

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
Yang CUI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 967-970
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
CCA-secure public-key encryptiongroup-dependent hash
 Summary | Full Text:PDF

A Trade-off Traitor Tracing Scheme
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 859-875
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Contents Protection
Keyword: 
dynamic traitor tracingwatermarkingdigital rights managementcontent distribution
 Summary | Full Text:PDF

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang CUI Eiichiro FUJISAKI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 53-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
identity based encryptiondigital signaturesecurity notions
 Summary | Full Text:PDF

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF

Invisibly Sanitizable Digital Signature Scheme
Kunihiko MIYAZAKI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 392-402
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
digital signatureinformation disclosureprivacy issue
 Summary | Full Text:PDF

Extension of Broadcasting Service by Using Electronic Tokens
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11  pp. 1741-1750
Type of Manuscript:  PAPER
Category: Contents Technology and Web Information Systems
Keyword: 
content distributiontokenanonymitygroup signatureprivacy preservation
 Summary | Full Text:PDF

Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs
Thi Lan Anh PHAN Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1814-1829
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
key insulated public key encryptionauxiliary helper keyIND-KE-CCA
 Summary | Full Text:PDF

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 1000-1011
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
traitor tracingkey exposurekey updatetwo variable-polynomial
 Summary | Full Text:PDF

How to Break COT-Based Fingerprinting Schemes and Design New One
JaeGwi CHOI Goichiro HANAOKA KyungHyune RHEE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2800-2807
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
fingerprintingcommitted oblivious transfer protocoltwo-lock cryptosystem
 Summary | Full Text:PDF

Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions
Yumiko HANAOKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2521-2532
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
key exposurekey-insulated encryptionunconditional security
 Summary | Full Text:PDF

Personal Entropy from Graphical Passwords: Methods for Quantification and Practical Key Generation
Masato AKAO Shinji YAMANAKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2543-2554
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
personal entropygraphical passwordsbiometricshumancryptkey generation
 Summary | Full Text:PDF

The Role of Arbiters for Unconditionally Secure Authentication
Goichiro HANAOKA Junji SHIKATA Yumiko HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1132-1140
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authentication codearbiterunconditional security
 Summary | Full Text:PDF

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF

Traceability Schemes against Illegal Distribution of Signed Documents
Shoko YONEZAWA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1172-1182
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
signed documentillegal distributiontraceabilitygroup signaturepartially blind signature
 Summary | Full Text:PDF

Managing Encryption and Key Publication Independently in Digital Rights Management Systems
Goichiro HANAOKA Kazuto OGAWA Itsuro MUROTA Go OHTAKE Keigo MAJIMA Seiichi GOHSHI Kimiyuki OYAMADA Seiichi NAMBA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 160-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
digital rights management systemscopyright protectionsemantic securityadaptive attacks
 Summary | Full Text:PDF

Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 120-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
digital signatureunconditional security
 Summary | Full Text:PDF

An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability
Akira OTSUKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 140-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic cashinformation theoretic securityunconditionally secure signature
 Summary | Full Text:PDF

A Traitor Traceable Conference System with Dynamic Sender
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 167-174
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor traceable schemeauthentication schemedynamic senderunconditional security
 Summary | Full Text:PDF

Improving the Secure Electronic Transaction Protocol by Using Signcryption
Goichiro HANAOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/08/01
Vol. E84-A  No. 8  pp. 2042-2051
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signcryptionSETcomputational overheadmessage overhead
 Summary | Full Text:PDF

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 222-230
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF

A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
Tsuyoshi NISHIOKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 214-221
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemdigital signature
 Summary | Full Text:PDF

An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1681-1690
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
credit-based paymentelectronic toll collection systemkey predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF