主な対外発表(査読付き国際学会及び論文誌)
2011年〜2014年3月現在のもの。青斜体 は当研究グループのメンバー。
暗号基礎理論
- Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, "Related Randomness Attacks for Public Key Encryption", (PKC2014)
- T. Matsuda, G. Hanaoka, "Chosen Ciphertext Security via UCE", (PKC2014)
- T. Matsuda, G. Hanaoka, "Chosen Ciphertext Security via Point Obfuscation", (TCC2014)
- T. Matsuda, "On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations", (TCC2014)
- T. Yamakawa, S. Yamada, T. Matsuda, G. Hanaoka, N. Kunihiro, "Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism", (ASIAPKC2013)
- T. Matsuda, G. Hanaoka, "Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption", (IWSEC2013)
- T. Matsuda, G. Hanaoka, "Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited", (PKC2013)
- K. Nuida, G. Hanaoka, "On the security of pseudorandomized information-theoretically secure schemes", (IEEE Transactions on Information Theory, vol.59, no.1 2013.)
- G. Hanaoka, T. Matsuda, J.C.N. Schuldt, "On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups", (CRYPTO2012)
- T. Matsuda, G. Hanaoka, K. Matsuura, "Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms", (PKC2012)
- Y. Sakemi, G. Hanaoka, T. Izu, M. Takenaka, and M. Yasuda, "Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-bit Elliptic Curve", (PKC2012)
- K. Nuida, T. Abe, S. Kaji, T. Maeno, Y. Numata, "A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators", (IWSEC2011)
- M.J. Mihaljevic and H. Imai, "An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Model", (WEWoRC2011)
- T. Matsuda, K. Matsuura, "On Black-Box Separations among Injective One-Way Functions", (TCC2011)
- T. Matsuda, K. Matsuura, "Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks", (PKC2011)
- Y. Sakai, G. Hanaoka, K. Kurosawa, K. Ohta, "How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model", (IEICE Transactions 94-A, 2011)
高機能暗号技術、電子署名
- N. Attrapadung, "Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More", (EUROCRYPT2014).
- Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt, "Group signature implies public-key encryption with non-interactive opening", (Int. J. Inf. Sec. 13(1), 2014.)
- S. Yamada, N. Attrapadung, G. Hanaoka, N. Kunihiro, "A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption", (PKC2014).
- T. Kitagawa, H. Kojima, N. Attrapadung, H. Imai, "Efficient and Fully Forward-Secure Ciphertext-Policy Attribute-Based Encryption", (ISC2013).
- K. Ohara, Y. Sakai, K. Emura, G. Hanaoka, "A Group Signature Scheme with Unbounded Message-Dependent Opening", (ASIACCS2013)
- N. Attrapadung, B. Libert, T. Peters, "Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures", (PKC2013).
- K. Emura, G. Hanaoka, G. Ohtake, T. Matsuda, S. Yamada, "Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption", (PKC2013)
- N. Attrapadung, B. Libert, "Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation", (Journal of Mathematical Cryptology 5(2), 2012).
- K. Kasamatsu, T. Matsuda, G. Hanaoka, H. Imai, "Ciphertext Policy Multi-dimensional Range Encryption", (ICISC2012)
- N. Attrapadung, B. Libert, T. Peters, "Computing on Authenticated Data: New Privacy Definitions and Constructions", (ASIACRYPT2012)
- M.J. Mihaljevic, "An Approach for Light-Weight Encryption Employing Dedicated Coding", (IEEE GLOBECOM2012)
- K. Kasamatsu, T. Matsuda, K. Emura, N. Attrapadung, G. Hanaoka, Hideki Imai, “Time-Specific Encryption from Forward-Secure Encryption”, (SCN2012)
- S. Yamada, G. Hanaoka, N. Kunihiro, "Space Efficient Signature Schemes from the RSA Assumption", (PKC2012)
- S. Yamada, N. Attrapadung, B. Santoso, G. Hanaoka, J.C.N. Schuldt, N. Kunihiro, "Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication", (PKC2012)
- Y. Sakai, J.C.N. Schuldt, K. Emura, G. Hanaoka, K. Ohta, "On the Security of Dynamic Group Signatures", (PKC2012)
- Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, T. Matsuda, K. Omote, "Group Signatures with Message-Dependent Opening", (Pairing2012)
- G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, Y. Zhao, "Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption", (CT-RSA2012)
- N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. Panafieu, C. Ràfols, "Attribute-based encryption schemes with constant-size ciphertexts", (Theor. Comput. Sci. 422, 2012)
- K.G. Paterson, J.C.N. Schuldt, M.S.S. Thomson, "On the Joint Security of Encryption and Signature, Revisited", (ASIACRYPT2011)
- M.J. Mihaljevic, H. Imai, M. David, K. Kobara and H. Watanabe, "On Advanced Cryptographic Techniques for Information Security of Smart Grid AMI", (CSIIRW2011)
- D. Chiba, T. Matsuda, J.C.N. Schuldt, K. Matsuura, "Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting", (ACNS2011)
- J.C.N. Schuldt, G. Hanaoka, "Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks", (ACNS2011)
- Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, K. Omote, "Towards Restricting Plaintext Space in Public Key Encryption", (IWSEC2011)
- J. Weng, Y. Zhao, G. Hanaoka, "On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010", (PKC2011)
- S. Yamada, N. Attrapadung, G. Hanaoka, N. Kunihiro, "Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption", PKC(2011)
- J.C.N. Schuldt, K. Matsuura, "On-line Non-transferable Signatures Revisited", (PKC2011)
- N. Attrapadung, B. Libert, "Homomorphic Network Coding Signatures in the Standard Model", (PKC2011)
- N. Attrapadung, B. Libert, E. Panafieu, "Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts", (PKC2011)
- M.J. Mihaljevic, H. Imai, "Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem", (SKEW2011)
- G. Hanaoka, S. Hirose, A. Miyaji, K. Miyazaki, B. Santoso, P. Yang, "Sequential Bitwise Sanitizable Signature Schemes", (IEICE Transactions 94-A, 2011)
- B. Santoso, K. Ohta, K. Sakiyama, G. Hanaoka, "An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness", (IEICE Transactions 94-A, 2011)
- R. Dowsley, J.M. Quade, A. Otsuka, G. Hanaoka, H. Imai, A.C.A. Nascimento, "Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data", (IEICE Transactions 94-A, 2011)
- A. Fujii, G. Ohtake, G. Hanaoka, N. Attrapadung, H. Watanabe, K. Ogawa, H. Imai, "Secure Broadcast System with Simultaneous Individual Messaging", (IEICE Transactions 94-A, 2011)