Tatsuaki Okamoto

From MaRDI portal
Person:887450

Available identifiers

zbMath Open okamoto.tatsuakiWikidataQ11473260 ScholiaQ11473260MaRDI QIDQ887450

List of research outcomes





PublicationDate of PublicationType
Signature Schemes with Randomized Verification2022-07-01Paper
Standard model leakage-resilient authenticated key exchange using inner-product extractors2022-03-31Paper
Efficient attribute-based signatures for unbounded arithmetic branching programs2020-01-28Paper
Fully secure functional encryption with a large class of relations from the decisional linear assumption2019-11-27Paper
Adaptively simulation-secure attribute-hiding predicate encryption2019-01-23Paper
Efficient functional encryption for inner-product values with full-hiding security2018-10-18Paper
Full-hiding (unbounded) multi-input inner product functional encryption from the \(k\)-linear assumption2018-05-29Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption2015-10-26Paper
Packing Messages and Optimizing Bootstrapping in GSW-FHE2015-08-27Paper
Universally Composable Identity-Based Encryption2014-08-21Paper
On Pairing-Based Cryptosystems2014-08-21Paper
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol2014-02-18Paper
Decentralized Attribute-Based Signatures2013-04-19Paper
Secure integration of asymmetric and symmetric encryption schemes2013-04-15Paper
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security2013-04-04Paper
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption2013-03-19Paper
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption2012-07-20Paper
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption2012-06-29Paper
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits2011-11-10Paper
Some Key Techniques on Pairing Vector Spaces2011-06-29Paper
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model2011-03-15Paper
Meta-Envy-Free Cake-Cutting Protocols2010-09-03Paper
Fully secure functional encryption with general relations from the decisional linear assumption2010-08-24Paper
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption2010-06-01Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Hierarchical Predicate Encryption for Inner-Products2009-12-15Paper
An eCK-secure authenticated key exchange protocol without random oracles2009-12-11Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Compact CCA-Secure Encryption for Messages of Arbitrary Length2009-03-24Paper
An Efficient Anonymous Credential System2009-02-12Paper
Homomorphic Encryption and Signatures from Vector Decomposition2009-02-10Paper
Chosen Ciphertext Security with Optimal Ciphertext Overhead2009-02-10Paper
Relationship of Three Cryptographic Channels in the UC Framework2009-01-27Paper
An optimistic fair exchange protocol and its security in the universal composability framework2009-01-15Paper
Authenticated Key Exchange and Key Encapsulation in the Standard Model2008-05-15Paper
Key size evaluation of provably secure RSA-based encryption schemes2007-08-22Paper
Theory of Cryptography2007-02-12Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Theory of Cryptography2005-12-07Paper
RSA-OAEP is secure under the RSA assumption2004-09-27Paper
https://portal.mardi4nfdi.de/entity/Q47837302002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45367992002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q45368072002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244352002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45483252002-08-26Paper
https://portal.mardi4nfdi.de/entity/Q27245852002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q49453902002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q45025152000-09-12Paper
Secure integration of asymmetric and symmetric encryption schemes2000-08-27Paper
On relationships between statistical zero-knowledge proofs2000-07-27Paper
https://portal.mardi4nfdi.de/entity/Q43140442000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q49406822000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42496651999-11-14Paper
https://portal.mardi4nfdi.de/entity/Q42634211999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q42496471999-09-09Paper
A practical and provably secure scheme for publicly verifiable secret sharing and its applications1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42493441999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43873241999-04-15Paper
https://portal.mardi4nfdi.de/entity/Q42285221999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
https://portal.mardi4nfdi.de/entity/Q43873111998-07-08Paper
A digital multisignature scheme using bijective public-key cryptosystems1998-04-01Paper
https://portal.mardi4nfdi.de/entity/Q43645401998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
A practical secret voting scheme for large scale elections1998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q43417891998-01-04Paper
https://portal.mardi4nfdi.de/entity/Q43434151997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43657501997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43434451997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43186861995-04-04Paper
https://portal.mardi4nfdi.de/entity/Q43186871995-02-16Paper
https://portal.mardi4nfdi.de/entity/Q43140221994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q42796941994-11-29Paper
Reducing elliptic curve logarithms to logarithms in a finite field1994-10-03Paper
How to Utilize the Randomness of Zero-Knowledge Proofs1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796871994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q40374871993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357241993-05-18Paper
Universal Electronic Cash1993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357251993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40369011993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q31973111990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33582261990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101701990-01-01Paper
A fast signature scheme based on congruential polynomial operations1990-01-01Paper

Research outcomes over time

This page was built for person: Tatsuaki Okamoto