Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2019-05-17 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions(from SCN 2018) Keisuke Hara, Fuyuki Kitagawa (TokyoTech), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (TokyoTech) ISEC2019-1 |
[more] |
ISEC2019-1 p.1 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:10 |
Hokkaido |
Sapporo Convention Center |
[Invited Talk]
Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018) Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23 |
In this invited talk, we introduce the paper, “ Memory Lower Bounds of Reductions Revisited ” by Y. Wang, T. Matsuda, G.... [more] |
ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23 p.93 |
ISEC |
2017-05-12 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Size-Hiding Computation for Multiple Parties
-- from ASIACRYPT 2016 -- Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Koji Nuida (AIST/PRESTO), Takashi Nishide (Univ. of Tsukuba), Goichiro Hanaoka (AIST), Eiji Okamoto (Univ. of Tsukuba) ISEC2017-4 |
[more] |
ISEC2017-4 p.23 |
ISEC |
2017-05-12 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones Yuyu Wang (Tokyo Tech/AIST), Zongyang Zhang (Beihang University), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech) ISEC2017-12 |
In this paper, we bridge the gap between structure-preserving signatures (SPSs) and fully structure-preserving signature... [more] |
ISEC2017-12 p.63 |
COMP, ISEC |
2016-12-22 12:30 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44 |
[more] |
ISEC2016-83 COMP2016-44 p.73 |
ISEC |
2016-09-02 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Homomorphic Encryption based on some kind of Indeterminate Equations Koichiro Akiyama (Toshiba), Yasuhiro Goto (HUE), Shinya Okumura (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-43 |
Authors propose a homomorphic public-key encryption whose security is based on a LWE-like problem related to indetermina... [more] |
ISEC2016-43 pp.27-34 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 14:30 |
Yamaguchi |
|
Algebraic Surface Cryptosystems using Polynomial Approximate GCD Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43 |
Since the original proposal in 2004, several attacks have been reported against algebraic surface cryptosystems. This re... [more] |
ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43 pp.217-222 |
ISEC |
2016-05-19 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3 |
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] |
ISEC2016-3 p.13 |
ISEC |
2014-12-19 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications Takashi Yamakawa (Univ. of Tokyo), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (Univ. of Tokyo) ISEC2014-73 |
[more] |
ISEC2014-73 p.21 |
IT, ISEC, WBS |
2013-03-08 16:00 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST) IT2012-107 ISEC2012-125 WBS2012-93 |
In proxy re-encryption (PRE) schemes, the proxy re-encrypts a ciphertext $C$ for Alice into $C'$ which Bob can decrypt.... [more] |
IT2012-107 ISEC2012-125 WBS2012-93 pp.285-291 |
ISEC |
2012-12-12 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Goichiro Hanaoka, Takahiro Matsuda (AIST), Jacob Schuldt (RHUL) ISEC2012-79 |
In this invited talk, we introduce the lecture with the same title presented at the 32nd International Cryptology Confer... [more] |
ISEC2012-79 p.43 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:50 |
Aomori |
Hirosaki University |
An Efficient Broadcast Encryption with Personalized Messages Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2010-31 SITE2010-27 ICSS2010-37 |
In broadcasting services, a broadcaster may transmit not only a roadcast content but also a personalized message for eac... [more] |
ISEC2010-31 SITE2010-27 ICSS2010-37 pp.159-166 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:10 |
Aomori |
Hirosaki University |
DLP with Auxiliary Input and the Security of Cryptographic Protocols Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,) ISEC2010-35 SITE2010-31 ICSS2010-41 |
The security of publick-key cryptographic protocols are reduced to the infeasibility of underlying mathematical problems... [more] |
ISEC2010-35 SITE2010-31 ICSS2010-41 pp.189-194 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:35 |
Akita |
Akita University |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44 |
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more] |
ISEC2009-30 SITE2009-22 ICSS2009-44 pp.161-168 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:20 |
Hokkaido |
Future University-Hakodate |
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2007-65 |
In the bidirectional broadcasting service via networks, provider authentication is necessary for secure transmission of ... [more] |
ISEC2007-65 pp.133-139 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 10:45 |
Iwate |
Iwate Prefectural University |
Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] |
ISEC2005-46 pp.25-32 |
IT |
2005-05-27 13:30 |
Overseas |
Univ. of Hawaii |
A Remark On GEM Rui Zhang, Goichiro Hanaoka, Hideki Imai (Univ. of Tokyo) |
[more] |
IT2005-28 pp.35-40 |
ISEC |
2004-09-17 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Trade-off Traitor Tracing Goichiro Hanaoka (U. of Tokyo), Kazuto Ogawa, Arisa Fujii, Go Ohtake, Keigo Majima, Kimiyuki Oyamada (NHK), Hideki Imai (U. of Tokyo) |
[more] |
ISEC2004-73 pp.39-46 |
ISEC |
2004-09-17 17:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives Nuttapong Attrapadung, Goichiro Hanaoka, Kazukuni Kobara, Hideki Imai (Tokyo Univ.) |
[more] |
ISEC2004-77 pp.69-76 |
ISEC, IPSJ-CSEC |
2004-07-20 14:45 |
Tokushima |
Tokushima Univ. |
A Secure Traitor Tracing Scheme against Key Exposure Kazuto Ogawa, Arisa Fujii, Go Ohtake (NHK), Goichiro Hanaoka, Hideki Imai (U. of Tokyo), Keigo Majima, Kimiyuki Oyamada (NHK) |
Copyright protection is a major issue in distributing content on the Internet. One well-known method of protecting copyr... [more] |
ISEC2004-35 pp.151-158 |