Identity-based hierarchical strongly key-insulated encryption and its application Y Hanaoka, G Hanaoka, J Shikata, H Imai Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005 | 122 | 2005 |
Digitally signed document sanitizing scheme based on bilinear maps K Miyazaki, G Hanaoka, H Imai Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 114 | 2006 |
Bounded CCA2-secure encryption R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ... Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 111 | 2007 |
A framework and compact constructions for non-monotonic attribute-based encryption S Yamada, N Attrapadung, G Hanaoka, N Kunihiro Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 104 | 2014 |
Generic constructions for chosen-ciphertext secure attribute based encryption S Yamada, N Attrapadung, G Hanaoka, N Kunihiro Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011 | 103 | 2011 |
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption G Hanaoka, K Kurosawa International Conference on the Theory and Application of Cryptology and …, 2008 | 98 | 2008 |
Parallel key-insulated public key encryption G Hanaoka, Y Hanaoka, H Imai Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 97 | 2006 |
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka 2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017 | 91 | 2017 |
Generic construction of chosen ciphertext secure proxy re-encryption G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 85 | 2012 |
Group signatures with message-dependent opening Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 76 | 2013 |
Unconditionally secure digital signature schemes admitting transferability G Hanaoka, J Shikata, Y Zheng, H Imai Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000 | 70 | 2000 |
A framework for identity-based encryption with almost tight security N Attrapadung, G Hanaoka, S Yamada Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015 | 67 | 2015 |
On the security of dynamic group signatures: Preventing signature hijacking Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 66 | 2012 |
On the security of the schnorr signature scheme and DSA against related-key attacks H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata Information Security and Cryptology-ICISC 2015: 18th International …, 2016 | 63 | 2016 |
Attribute-based signatures for circuits from bilinear map Y Sakai, N Attrapadung, G Hanaoka Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 58 | 2016 |
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs N Attrapadung, G Hanaoka, S Yamada Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015 | 55 | 2015 |
Efficient asymmetric public-key traitor tracing without trusted agents Y Watanabe, G Hanaoka, H Imai Cryptographers’ Track at the RSA Conference, 392-407, 2001 | 54 | 2001 |
Signature schemes with a fuzzy private key K Takahashi, T Matsuda, T Murakami, G Hanaoka, M Nishigaki International Journal of Information Security 18, 581-617, 2019 | 52 | 2019 |
On the security of multiple encryption or CCA-security+ CCA-security= CCA-security? R Zhang, G Hanaoka, J Shikata, H Imai International Workshop on Public Key Cryptography, 360-374, 2004 | 51 | 2004 |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ... Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 48 | 2012 |