


Остановите войну!
for scientists:


default search action
Tatsuaki Okamoto
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j35]Tatsuaki Okamoto
:
A New Quantitative Definition of the Complexity of Organized Matters. Complex. 2022: 1889348:1-1889348:18 (2022) - [j34]Janaka Alawatugoda
, Tatsuaki Okamoto:
Standard model leakage-resilient authenticated key exchange using inner-product extractors. Des. Codes Cryptogr. 90(4): 1059-1079 (2022) - [c89]Wei Dai, Tatsuaki Okamoto, Go Yamamoto:
Stronger Security and Generic Constructions for Adaptor Signatures. INDOCRYPT 2022: 52-77 - [i22]Wei Dai, Tatsuaki Okamoto, Go Yamamoto:
Stronger Security and Generic Constructions for Adaptor Signatures. IACR Cryptol. ePrint Arch. 2022: 1687 (2022) - 2021
- [j33]Pratish Datta
, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 25-57 (2021) - [i21]Janaka Alawatugoda, Tatsuaki Okamoto:
Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors. IACR Cryptol. ePrint Arch. 2021: 861 (2021) - 2020
- [j32]Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto:
Efficient Inner Product Functional Encryption with Full-Hiding Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 33-40 (2020) - [j31]Tatsuaki Okamoto, Katsuyuki Takashima:
Decentralized Attribute-Based Encryption and Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 41-73 (2020) - [j30]Pratish Datta
, Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. IEICE Trans. Inf. Syst. 103-D(7): 1556-1597 (2020)
2010 – 2019
- 2019
- [j29]Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption. J. Cryptol. 32(4): 1491-1573 (2019) - [c88]Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. Public Key Cryptography (1) 2019: 127-158 - [i20]Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. IACR Cryptol. ePrint Arch. 2019: 363 (2019) - 2018
- [c87]Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. ASIACRYPT (2) 2018: 640-672 - [c86]Pratish Datta, Tatsuaki Okamoto, Junichi Tomida:
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption. Public Key Cryptography (2) 2018: 245-277 - [i19]Pratish Datta, Tatsuaki Okamoto, Junichi Tomida:
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption. IACR Cryptol. ePrint Arch. 2018: 61 (2018) - [i18]Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption. IACR Cryptol. ePrint Arch. 2018: 1093 (2018) - 2017
- [c85]Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. ACNS 2017: 373-389 - [e9]Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3 [contents] - 2016
- [j28]Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto:
Packing Messages and Optimizing Bootstrapping in GSW-FHE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 73-82 (2016) - [j27]Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 92-117 (2016) - [j26]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1591-1599 (2016) - [c84]Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto:
Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security. ISC 2016: 408-425 - [i17]Tatsuaki Okamoto:
A Unified Paradigm of Organized Complexity and Semantic Information Theory. CoRR abs/1608.00941 (2016) - 2015
- [j25]Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. Des. Codes Cryptogr. 77(2-3): 725-771 (2015) - [j24]Tatsuaki Okamoto, Katsuyuki Takashima:
Dual Pairing Vector Spaces and Their Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 3-15 (2015) - [j23]Yoshifumi Manabe, Risako Otsuka, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus. J. Inf. Process. 23(3): 299-304 (2015) - [c83]Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. ASIACRYPT (1) 2015: 121-145 - [c82]Ryo Hiromasa, Masayuki Abe, Tatsuaki Okamoto:
Packing Messages and Optimizing Bootstrapping in GSW-FHE. Public Key Cryptography 2015: 699-715 - [e8]Rainer Böhme, Tatsuaki Okamoto:
Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8975, Springer 2015, ISBN 978-3-662-47853-0 [contents] - [i16]Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. IACR Cryptol. ePrint Arch. 2015: 869 (2015) - 2014
- [j22]Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model. IEEE Trans. Cloud Comput. 2(4): 409-421 (2014) - [c81]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. TCC 2014: 343-367 - 2013
- [j21]Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 42-52 (2013) - [j20]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 68-75 (2013) - [j19]Masayuki Abe, Tatsuaki Okamoto, Koutarou Suzuki:
Message Recovery Signature Schemes from Sigma-Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 92-100 (2013) - [j18]Eiichiro Fujisaki, Tatsuaki Okamoto:
Secure Integration of Asymmetric and Symmetric Encryption Schemes. J. Cryptol. 26(1): 80-101 (2013) - [c80]Tatsuaki Okamoto, Katsuyuki Takashima:
Decentralized Attribute-Based Signatures. Public Key Cryptography 2013: 125-142 - [i15]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. IACR Cryptol. ePrint Arch. 2013: 811 (2013) - 2012
- [j17]Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-envy-free Cake-cutting and Pie-cutting Protocols. J. Inf. Process. 20(3): 686-693 (2012) - [c79]Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. ASIACRYPT 2012: 349-366 - [c78]Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. EUROCRYPT 2012: 591-608 - [c77]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. IWSEC 2012: 216-232 - [c76]Yoshifumi Manabe, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol. IWIGP 2012: 15-23 - [i14]Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2012: 671 (2012) - 2011
- [j16]Daisuke Moriyama, Tatsuaki Okamoto:
An eCK-secure Authenticated Key Exchange Protocol without Random Oracles. KSII Trans. Internet Inf. Syst. 5(3): 607-625 (2011) - [c75]Tatsuaki Okamoto, Katsuyuki Takashima:
Some Key Techniques on Pairing Vector Spaces. AFRICACRYPT 2011: 380-382 - [c74]Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. CANS 2011: 138-159 - [c73]Daisuke Moriyama, Tatsuaki Okamoto:
Leakage resilient eCK-secure key exchange protocol without random oracles. AsiaCCS 2011: 441-447 - [c72]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. IWSEC 2011: 51-64 - [c71]Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model. Public Key Cryptography 2011: 35-52 - [i13]Tatsuaki Okamoto, Katsuyuki Takashima:
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. IACR Cryptol. ePrint Arch. 2011: 543 (2011) - [i12]Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. IACR Cryptol. ePrint Arch. 2011: 648 (2011) - [i11]Tatsuaki Okamoto, Katsuyuki Takashima:
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 700 (2011) - [i10]Tatsuaki Okamoto, Katsuyuki Takashima:
Decentralized Attribute-Based Signatures. IACR Cryptol. ePrint Arch. 2011: 701 (2011) - 2010
- [j15]Masayuki Abe, Eike Kiltz
, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 22-33 (2010) - [c70]Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. CRYPTO 2010: 191-208 - [c69]Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT 2010: 62-91 - [c68]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. IWSEC 2010: 149-163 - [c67]Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-Envy-Free Cake-Cutting Protocols. MFCS 2010: 501-512 - [i9]Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. IACR Cryptol. ePrint Arch. 2010: 110 (2010) - [i8]Tatsuaki Okamoto, Katsuyuki Takashima:
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. IACR Cryptol. ePrint Arch. 2010: 563 (2010)
2000 – 2009
- 2009
- [c66]Tatsuaki Okamoto, Katsuyuki Takashima:
Hierarchical Predicate Encryption for Inner-Products. ASIACRYPT 2009: 214-231 - [c65]Masayuki Abe, Eike Kiltz
, Tatsuaki Okamoto:
Compact CCA-Secure Encryption for Messages of Arbitrary Length. Public Key Cryptography 2009: 377-392 - [c64]Daisuke Moriyama, Tatsuaki Okamoto:
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. ProvSec 2009: 154-167 - 2008
- [j14]Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:
Universally Composable Identity-Based Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 262-271 (2008) - [j13]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of KEM and DEM. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 283-297 (2008) - [j12]Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto:
An optimistic fair exchange protocol and its security in the universal composability framework. Int. J. Appl. Cryptogr. 1(1): 70-77 (2008) - [c63]Masayuki Abe, Eike Kiltz
, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. ASIACRYPT 2008: 355-371 - [c62]Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto:
An Efficient Anonymous Credential System. Financial Cryptography 2008: 272-286 - [c61]Tatsuaki Okamoto, Katsuyuki Takashima:
Homomorphic Encryption and Signatures from Vector Decomposition. Pairing 2008: 57-74 - [c60]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
Relationship of Three Cryptographic Channels in the UC Framework. ProvSec 2008: 268-282 - [c59]Yoshifumi Manabe, Tatsuaki Okamoto:
Anonymous return route information for onion based mix-nets. SecureComm 2008 - [i7]Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. IACR Cryptol. ePrint Arch. 2008: 374 (2008) - 2007
- [c58]Tatsuaki Okamoto:
Authenticated Key Exchange and Key Encapsulation in the Standard Model. ASIACRYPT 2007: 474-484 - [e7]Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings. Lecture Notes in Computer Science 4856, Springer 2007, ISBN 978-3-540-76968-2 [contents] - [e6]Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4575, Springer 2007, ISBN 978-3-540-73488-8 [contents] - [e5]Tatsuaki Okamoto, Xiaoyun Wang:
Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4450, Springer 2007, ISBN 978-3-540-71676-1 [contents] - [i6]Tatsuaki Okamoto:
Authenticated Key Exchange and Key Encapsulation Without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 473 (2007) - 2006
- [j11]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 28-38 (2006) - [c57]Tatsuaki Okamoto:
Cryptography Based on Bilinear Maps. AAECC 2006: 35-50 - [c56]Tatsuaki Okamoto:
Efficient Blind and Partially Blind Signatures Without Random Oracles. TCC 2006: 80-99 - [c55]Tatsuaki Okamoto:
On Pairing-Based Cryptosystems. VIETCRYPT 2006: 50-66 - [c54]Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:
Universally Composable Identity-Based Encryption. VIETCRYPT 2006: 337-353 - [i5]Tatsuaki Okamoto:
Efficient Blind and Partially Blind Signatures Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 102 (2006) - [i4]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2006: 268 (2006) - 2005
- [j10]Chung-Huang Yang, Hikaru Morita, Tatsuaki Okamoto:
Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms. IEICE Trans. Commun. 88-B(3): 1244-1248 (2005) - [c53]Tatsuaki Okamoto:
Relationship of three cryptographic channels in the UC framework. ICITS 2005: 73 - [c52]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework. TCC 2005: 426-444 - [i3]Tatsuaki Okamoto, Ryo Kashima:
Resource Bounded Unprovability of Computational Lower Bounds. CoRR abs/cs/0503091 (2005) - 2004
- [j9]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval
, Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption. J. Cryptol. 17(2): 81-104 (2004) - [c51]Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka:
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. Public Key Cryptography 2004: 291-304 - [e4]Tatsuaki Okamoto:
Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science 2964, Springer 2004, ISBN 3-540-20996-4 [contents] - 2003
- [c50]Tatsuaki Okamoto, Jacques Stern:
Almost Uniform Density of Power Residues and the Provable Security of ESIGN. ASIACRYPT 2003: 287-301 - [i2]Tatsuaki Okamoto, Ryo Kashima:
Resource Bounded Unprovability of Computational Lower Bounds. IACR Cryptol. ePrint Arch. 2003: 187 (2003) - 2002
- [j8]Masayuki Abe, Tatsuaki Okamoto:
Delegation Chains Secure up to Constant Length. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 110-116 (2002) - 2001
- [c49]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern:
RSA-OAEP Is Secure under the RSA Assumption. CRYPTO 2001: 260-274 - [c48]Tatsuaki Okamoto, David Pointcheval
:
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. CT-RSA 2001: 159-175 - [c47]Tatsuaki Okamoto, David Pointcheval
:
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes. Public Key Cryptography 2001: 104-118 - [e3]Sihan Qing, Tatsuaki Okamoto, Jianying Zhou:
Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Lecture Notes in Computer Science 2229, Springer 2001, ISBN 3-540-42880-1 [contents] - 2000
- [j7]Tatsuaki Okamoto:
On Relationships between Statistical Zero-Knowledge Proofs. J. Comput. Syst. Sci. 60(1): 47-108 (2000) - [c46]Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama:
Quantum Public-Key Cryptosystems. CRYPTO 2000: 147-165 - [c45]Masayuki Abe, Tatsuaki Okamoto:
Provably Secure Partially Blind Signatures. CRYPTO 2000: 271-286 - [e2]Tatsuaki Okamoto:
Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings. Lecture Notes in Computer Science 1976, Springer 2000, ISBN 3-540-41404-5 [contents] - [i1]Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern:
RSA-OAEP is Secure under the RSA Assumption. IACR Cryptol. ePrint Arch. 2000: 61 (2000)
1990 – 1999
- 1999
- [c44]Masayuki Abe, Tatsuaki Okamoto:
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. ASIACRYPT 1999: 378-389 - [c43]Eiichiro Fujisaki, Tatsuaki Okamoto:
Secure Integration of Asymmetric and Symmetric Encryption Schemes. CRYPTO 1999: 537-554 - [c42]Masayuki Abe, Tatsuaki Okamoto:
Delegation Chains Secure up to Constant Length. ICICS 1999: 144-156 - [c41]Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto:
An Improvement on a Practical Secret Voting Scheme. ISW 1999: 225-234 - [c40]Eiichiro Fujisaki, Tatsuaki Okamoto:
How to Enhance the Security of Public-Key Encryption at Minimum Cost. Public Key Cryptography 1999: 53-68 - 1998
- [c39]Kazuo Ohta, Tatsuaki Okamoto:
On Concrete Security Treatment of Signatures Derived from Identification. CRYPTO 1998: 354-369 - [c38]Eiichiro Fujisaki, Tatsuaki Okamoto:
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. EUROCRYPT 1998: 32-46 - [c37]Tatsuaki Okamoto, Shigenori Uchiyama:
A New Public-Key Cryptosystem as Secure as Factoring. EUROCRYPT 1998: 308-318 - [c36]Tatsuaki Okamoto, Shigenori Uchiyama:
Security of an Identity-Based Cryptosystem and the Related Reductions. EUROCRYPT 1998: 546-560 - [c35]Tatsuaki Okamoto, Moti Yung:
Lower Bounds on Term-Based Divisible Cash Systems. Public Key Cryptography 1998: 72-82 - 1997
- [c34]Eiichiro Fujisaki, Tatsuaki Okamoto:
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations. CRYPTO 1997: 16-30 - [c33]Giovanni Di Crescenzo, Tatsuaki Okamoto, Moti Yung:
Keeping the SZK-Verifier Honest Unconditionally. CRYPTO 1997: 31-45 - [c32]Tatsuaki Okamoto:
Receipt-Free Electronic Voting Schemes for Large Scale Elections. Security Protocols Workshop 1997: 25-35 - [c31]Tatsuaki Okamoto:
Threshold Key-Recovery Systems for RSA. Security Protocols Workshop 1997: 191-200 - [e1]