-
[文献書誌] G.Hanaoka, J.Shikata, Y.Zheng, H.Imai: "Unconditionally Secure Digital Signature Scheme and its extensions"2000年暗号と情報セキュリティシンポジウム講演論文集. C30. (2000)
-
[文献書誌] 花岡悟一郎, 四方順司, 今井秀樹: "情報量的安全性に基づく書名方式におけるセンターの分散化方式"第23回情報理論とその応用シンポジウム(SITA2000)予稿集. 583-58 (2000)
-
[文献書誌] 四方順司, 花岡悟一郎, Y.Zheng, 今井秀樹: "情報量的安全性に基づくメッセージ復元型書名方式の構成"第23回情報理論とその応用シンポジウム(SITA2000)予稿集. 579-582 (2000)
-
[文献書誌] G.Hanaoka, J.Shikata, Y.Zheng, H.Imai: "Unconditionally Secure Digital Signature Schemes Admitting Transferability"Advances in Cryptology - ASIACRYPT2000, LNCS 1976, Springer-Verlag. 130-142 (2000)
-
[文献書誌] G.Hanaoka, Y.Zheng, H.Imai: "Renewing Scheme for Secret Keys in ID-based Cryptosystems"International Symposium on Information Theory and its Applications(ISITA2000), Waikiki. (2000)
-
[文献書誌] D.Nojiri, G.Hanaoka, H.Imai: "A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation"ISW2000, LNCS 1975 Information Security ISW2000 Proceedings, Wollongong, Australia. 224-236 (2000)
-
[文献書誌] 四方順司, 花岡悟一郎, Y.Zheng, 今井秀樹: "情報量的安全性に基づく転送可能なone-time書名方式"2001年暗号と情報セキュリテイシンポジウム(SCIS2001). 2B-3. (2001)
-
[文献書誌] G.Hanaoka, T.Nishioka, Y.Zheng, H.Imai: "Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks"IEICE Trans. Fundamentals, Special Section on Cryptology and Information Security. Vol.E-84A, no.1. (2001)
-
[文献書誌] T.Nishioka, G.Hanaoka, H.Imai: "A Digital Signature Scheme on ID-based Key-Sharing Infrastructures"IEICE Trans., Special Section on Cryptography and Information Security. (2001)
-
[文献書誌] G.Hanaoka, Y.Zheng, H.Imai: "Improving the secure electronic transaction protocol by using signcryption"IEICE Transactions. Vol.E-84A. 2042-2051 (2001)
-
[文献書誌] G.Hanaoka, T.Nishioka, Y.Zheng, H.Imai: "A hierarchical noninteractive key-sharing scheme with low memory size and high resistance against collusion attacks"The Computer Journal. (発表予定). (2002)
-
[文献書誌] G.Hanaoka, J.Shikata, Y.Zheng, H.Imai: "Efficient and unconditionally secure digital signatures and a security analysis on a multireceiver authentication code"Public Key Cryptography, Lecture Note in Computer Science. 2274. 64-79 (2002)
-
[文献書誌] G.Hanaoka, J.Shikata, Y.Zheng, H.Imai: "A traitor traceable conference system with dynamic sender"IEICE Transactions. Vol.E-85A. 167-174 (2002)