Tatsuaki Okamoto

From MaRDI portal
Person:887450

Available identifiers

zbMath Open okamoto.tatsuakiWikidataQ11473260 ScholiaQ11473260MaRDI QIDQ887450

List of research outcomes





PublicationDate of PublicationType
Signature schemes with randomized verification2022-07-01Paper
Standard model leakage-resilient authenticated key exchange using inner-product extractors2022-03-31Paper
Efficient attribute-based signatures for unbounded arithmetic branching programs2020-01-28Paper
Fully secure functional encryption with a large class of relations from the decisional linear assumption2019-11-27Paper
Adaptively simulation-secure attribute-hiding predicate encryption2019-01-23Paper
Efficient functional encryption for inner-product values with full-hiding security2018-10-18Paper
Full-hiding (unbounded) multi-input inner product functional encryption from the \(k\)-linear assumption2018-05-29Paper
New realizations of somewhere statistically binding hashing and positional accumulators2016-06-10Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption2015-10-26Paper
Packing messages and optimizing bootstrapping in GSW-FHE2015-08-27Paper
Universally composable identity-based encryption2014-08-21Paper
On pairing-based cryptosystems2014-08-21Paper
Constant-round black-box construction of composable multi-party computation protocol2014-02-18Paper
Decentralized attribute-based signatures2013-04-19Paper
Secure integration of asymmetric and symmetric encryption schemes2013-04-15Paper
Efficient concurrent oblivious transfer in super-polynomial-simulation security2013-04-04Paper
Fully secure unbounded inner-product and attribute-based encryption2013-03-19Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption2012-07-20Paper
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption2012-06-29Paper
A secure \(M + 1^{\text{st}}\) price auction protocol based on bit slice circuits2011-11-10Paper
Some key techniques on pairing vector spaces2011-06-29Paper
Efficient attribute-based signatures for non-monotone predicates in the standard model2011-03-15Paper
Meta-Envy-Free Cake-Cutting Protocols2010-09-03Paper
Fully secure functional encryption with general relations from the decisional linear assumption2010-08-24Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption2010-06-01Paper
Almost uniform density of power residues and the provable security of ESIGN2010-01-05Paper
Hierarchical Predicate Encryption for Inner-Products2009-12-15Paper
An eCK-secure authenticated key exchange protocol without random oracles2009-12-11Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Compact CCA-Secure Encryption for Messages of Arbitrary Length2009-03-24Paper
An Efficient Anonymous Credential System2009-02-12Paper
Homomorphic Encryption and Signatures from Vector Decomposition2009-02-10Paper
Chosen Ciphertext Security with Optimal Ciphertext Overhead2009-02-10Paper
Relationship of Three Cryptographic Channels in the UC Framework2009-01-27Paper
An optimistic fair exchange protocol and its security in the universal composability framework2009-01-15Paper
Authenticated Key Exchange and Key Encapsulation in the Standard Model2008-05-15Paper
Key size evaluation of provably secure RSA-based encryption schemes2007-08-22Paper
Theory of Cryptography2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Theory of Cryptography2005-12-07Paper
RSA-OAEP is secure under the RSA assumption2004-09-27Paper
https://portal.mardi4nfdi.de/entity/Q47837302002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45367992002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q45368072002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244352002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45483252002-08-26Paper
https://portal.mardi4nfdi.de/entity/Q27245852002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q49453902002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q45025152000-09-12Paper
Secure integration of asymmetric and symmetric encryption schemes2000-08-27Paper
On relationships between statistical zero-knowledge proofs2000-07-27Paper
https://portal.mardi4nfdi.de/entity/Q43140442000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q49406822000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42496651999-11-14Paper
https://portal.mardi4nfdi.de/entity/Q42634211999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q42496471999-09-09Paper
A practical and provably secure scheme for publicly verifiable secret sharing and its applications1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42493441999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43873241999-04-15Paper
https://portal.mardi4nfdi.de/entity/Q42285221999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
https://portal.mardi4nfdi.de/entity/Q43873111998-07-08Paper
A digital multisignature scheme using bijective public-key cryptosystems1998-04-01Paper
https://portal.mardi4nfdi.de/entity/Q43645401998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
A practical secret voting scheme for large scale elections1998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q43417891998-01-04Paper
https://portal.mardi4nfdi.de/entity/Q43434151997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43657501997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43434451997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43186861995-04-04Paper
https://portal.mardi4nfdi.de/entity/Q43186871995-02-16Paper
https://portal.mardi4nfdi.de/entity/Q43140221994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q42796941994-11-29Paper
Reducing elliptic curve logarithms to logarithms in a finite field1994-10-03Paper
How to Utilize the Randomness of Zero-Knowledge Proofs1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796871994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q40374871993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357241993-05-18Paper
Universal Electronic Cash1993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357251993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40369011993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q31973111990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33582261990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101701990-01-01Paper
A fast signature scheme based on congruential polynomial operations1990-01-01Paper

Research outcomes over time

This page was built for person: Tatsuaki Okamoto