Tatsuaki Okamoto

From MaRDI portal
Person:887450

Available identifiers

zbMath Open okamoto.tatsuakiWikidataQ11473260 ScholiaQ11473260MaRDI QIDQ887450

List of research outcomes

PublicationDate of PublicationType
Standard model leakage-resilient authenticated key exchange using inner-product extractors2022-03-31Paper
Efficient attribute-based signatures for unbounded arithmetic branching programs2020-01-28Paper
Fully secure functional encryption with a large class of relations from the decisional linear assumption2019-11-27Paper
Adaptively simulation-secure attribute-hiding predicate encryption2019-01-23Paper
Efficient functional encryption for inner-product values with full-hiding security2018-10-18Paper
Full-hiding (unbounded) multi-input inner product functional encryption from the \(k\)-linear assumption2018-05-29Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption2015-10-26Paper
Packing Messages and Optimizing Bootstrapping in GSW-FHE2015-08-27Paper
On Pairing-Based Cryptosystems2014-08-21Paper
Universally Composable Identity-Based Encryption2014-08-21Paper
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol2014-02-18Paper
Decentralized Attribute-Based Signatures2013-04-19Paper
Secure integration of asymmetric and symmetric encryption schemes2013-04-15Paper
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security2013-04-04Paper
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption2013-03-19Paper
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption2012-07-20Paper
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption2012-06-29Paper
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits2011-11-10Paper
Some Key Techniques on Pairing Vector Spaces2011-06-29Paper
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model2011-03-15Paper
Meta-Envy-Free Cake-Cutting Protocols2010-09-03Paper
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption2010-08-24Paper
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption2010-06-01Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Hierarchical Predicate Encryption for Inner-Products2009-12-15Paper
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles2009-12-11Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Compact CCA-Secure Encryption for Messages of Arbitrary Length2009-03-24Paper
An Efficient Anonymous Credential System2009-02-12Paper
Chosen Ciphertext Security with Optimal Ciphertext Overhead2009-02-10Paper
Homomorphic Encryption and Signatures from Vector Decomposition2009-02-10Paper
Relationship of Three Cryptographic Channels in the UC Framework2009-01-27Paper
An optimistic fair exchange protocol and its security in the universal composability framework2009-01-15Paper
Authenticated Key Exchange and Key Encapsulation in the Standard Model2008-05-15Paper
https://portal.mardi4nfdi.de/entity/Q57544672007-08-22Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
RSA-OAEP is secure under the RSA assumption2004-09-27Paper
https://portal.mardi4nfdi.de/entity/Q47837302002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45367992002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q45368072002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244352002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45483252002-08-26Paper
https://portal.mardi4nfdi.de/entity/Q27245852002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q49453902002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q45025152000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q49418782000-08-27Paper
On relationships between statistical zero-knowledge proofs2000-07-27Paper
https://portal.mardi4nfdi.de/entity/Q43140442000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q49406822000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42496651999-11-14Paper
https://portal.mardi4nfdi.de/entity/Q42634211999-09-22Paper
A practical and provably secure scheme for publicly verifiable secret sharing and its applications1999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42496471999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42493441999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43873241999-04-15Paper
https://portal.mardi4nfdi.de/entity/Q42285221999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q38400801998-12-14Paper
https://portal.mardi4nfdi.de/entity/Q43873111998-07-08Paper
A digital multisignature scheme using bijective public-key cryptosystems1998-04-01Paper
https://portal.mardi4nfdi.de/entity/Q43645401998-02-10Paper
https://portal.mardi4nfdi.de/entity/Q43645411998-02-10Paper
A practical secret voting scheme for large scale elections1998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q43417891998-01-04Paper
https://portal.mardi4nfdi.de/entity/Q43434151997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43657501997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43434451997-07-06Paper
https://portal.mardi4nfdi.de/entity/Q43186861995-04-04Paper
https://portal.mardi4nfdi.de/entity/Q43186871995-02-16Paper
https://portal.mardi4nfdi.de/entity/Q43140221994-11-30Paper
https://portal.mardi4nfdi.de/entity/Q42796941994-11-29Paper
Reducing elliptic curve logarithms to logarithms in a finite field1994-10-03Paper
How to Utilize the Randomness of Zero-Knowledge Proofs1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796871994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q40357241993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357251993-05-18Paper
Universal Electronic Cash1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40369011993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds1993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374871993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q31973111990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101701990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33582261990-01-01Paper
A fast signature scheme based on congruential polynomial operations1990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Tatsuaki Okamoto