BibTeX records: Tatsuaki Okamoto

download as .bib file

@article{DBLP:journals/complexity/Okamoto22,
  author       = {Tatsuaki Okamoto},
  title        = {A New Quantitative Definition of the Complexity of Organized Matters},
  journal      = {Complex.},
  volume       = {2022},
  pages        = {1889348:1--1889348:18},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/1889348},
  doi          = {10.1155/2022/1889348},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/Okamoto22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlawatugodaO22,
  author       = {Janaka Alawatugoda and
                  Tatsuaki Okamoto},
  title        = {Standard model leakage-resilient authenticated key exchange using
                  inner-product extractors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {1059--1079},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01028-0},
  doi          = {10.1007/S10623-022-01028-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlawatugodaO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DaiOY22,
  author       = {Wei Dai and
                  Tatsuaki Okamoto and
                  Go Yamamoto},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Stronger Security and Generic Constructions for Adaptor Signatures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {52--77},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_3},
  doi          = {10.1007/978-3-031-22912-1\_3},
  timestamp    = {Mon, 09 Jan 2023 17:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DaiOY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiOY22,
  author       = {Wei Dai and
                  Tatsuaki Okamoto and
                  Go Yamamoto},
  title        = {Stronger Security and Generic Constructions for Adaptor Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1687},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1687},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiOY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/DattaOT21,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching
                  Programs},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {25--57},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0003},
  doi          = {10.1587/TRANSFUN.2020CIP0003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/DattaOT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaO21,
  author       = {Janaka Alawatugoda and
                  Tatsuaki Okamoto},
  title        = {Standard Model Leakage-Resilient Authenticated Key Exchange using
                  Inner-product Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/861},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TomidaAO20,
  author       = {Junichi Tomida and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  title        = {Efficient Inner Product Functional Encryption with Full-Hiding Security},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {33--40},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_33},
  doi          = {10.1587/TRANSFUN.2019CIP0003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TomidaAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoT20,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Decentralized Attribute-Based Encryption and Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {41--73},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_41},
  doi          = {10.1587/TRANSFUN.2019CIP0008},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/DattaOT20,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {7},
  pages        = {1556--1597},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019ICP0001},
  doi          = {10.1587/TRANSINF.2019ICP0001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/DattaOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/OkamotoT19,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Functional Encryption with a Large Class of Relations
                  from the Decisional Linear Assumption},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1491--1573},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9305-0},
  doi          = {10.1007/S00145-018-9305-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/OkamotoT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaOT19,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching
                  Programs},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {127--158},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_5},
  doi          = {10.1007/978-3-030-17253-4\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaOT19,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching
                  Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DattaOT18,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {640--672},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_22},
  doi          = {10.1007/978-3-030-03329-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DattaOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaOT18,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Junichi Tomida},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption
                  from the k-Linear Assumption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {245--277},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_9},
  doi          = {10.1007/978-3-319-76581-5\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaOT18,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Junichi Tomida},
  title        = {Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption
                  from the k-Linear Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaOT18a,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaOT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FreitagGHKLOTW17,
  author       = {Cody Freitag and
                  Rishab Goyal and
                  Susan Hohenberger and
                  Venkata Koppula and
                  Eysa Lee and
                  Tatsuaki Okamoto and
                  Jordan Tran and
                  Brent Waters},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Signature Schemes with Randomized Verification},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {373--389},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_19},
  doi          = {10.1007/978-3-319-61204-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FreitagGHKLOTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2017,
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0},
  doi          = {10.1007/978-3-319-68637-0},
  isbn         = {978-3-319-68636-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiromasaAO16,
  author       = {Ryo Hiromasa and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  title        = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {1},
  pages        = {73--82},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.73},
  doi          = {10.1587/TRANSFUN.E99.A.73},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiromasaAO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoT16,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {1},
  pages        = {92--117},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.92},
  doi          = {10.1587/TRANSFUN.E99.A.92},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MitsunagaMO16,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {8},
  pages        = {1591--1599},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1591},
  doi          = {10.1587/TRANSFUN.E99.A.1591},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MitsunagaMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TomidaAO16,
  author       = {Junichi Tomida and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Efficient Functional Encryption for Inner-Product Values with Full-Hiding
                  Security},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_24},
  doi          = {10.1007/978-3-319-45871-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TomidaAO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Okamoto16,
  author       = {Tatsuaki Okamoto},
  title        = {A Unified Paradigm of Organized Complexity and Semantic Information
                  Theory},
  journal      = {CoRR},
  volume       = {abs/1608.00941},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.00941},
  eprinttype    = {arXiv},
  eprint       = {1608.00941},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Okamoto16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OkamotoT15,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Achieving short ciphertexts or short secret-keys for adaptively secure
                  general inner-product encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {725--771},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0131-1},
  doi          = {10.1007/S10623-015-0131-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OkamotoT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoT15,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Dual Pairing Vector Spaces and Their Applications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {3--15},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.3},
  doi          = {10.1587/TRANSFUN.E98.A.3},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/ManabeOO15,
  author       = {Yoshifumi Manabe and
                  Risako Otsuka and
                  Tatsuaki Okamoto},
  title        = {A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social
                  Surplus},
  journal      = {J. Inf. Process.},
  volume       = {23},
  number       = {3},
  pages        = {299--304},
  year         = {2015},
  url          = {https://doi.org/10.2197/ipsjjip.23.299},
  doi          = {10.2197/IPSJJIP.23.299},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/ManabeOO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {121--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_6},
  doi          = {10.1007/978-3-662-48797-6\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HiromasaAO15,
  author       = {Ryo Hiromasa and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Jonathan Katz},
  title        = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {699--715},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_31},
  doi          = {10.1007/978-3-662-46447-2\_31},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HiromasaAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015,
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7},
  doi          = {10.1007/978-3-662-47854-7},
  isbn         = {978-3-662-47853-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/OkamotoT14,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in
                  the Standard Model},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {2},
  number       = {4},
  pages        = {409--421},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCC.2014.2353053},
  doi          = {10.1109/TCC.2014.2353053},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/OkamotoT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiyoshimaMO14,
  author       = {Susumu Kiyoshima and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Yehuda Lindell},
  title        = {Constant-Round Black-Box Construction of Composable Multi-Party Computation
                  Protocol},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {343--367},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_15},
  doi          = {10.1007/978-3-642-54242-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiyoshimaMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkamotoT13,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced
                  from the Decisional Linear Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {42--52},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.42},
  doi          = {10.1587/TRANSFUN.E96.A.42},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkamotoT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MitsunagaMO13,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {68--75},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.68},
  doi          = {10.1587/TRANSFUN.E96.A.68},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MitsunagaMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbeOS13,
  author       = {Masayuki Abe and
                  Tatsuaki Okamoto and
                  Koutarou Suzuki},
  title        = {Message Recovery Signature Schemes from Sigma-Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {92--100},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.92},
  doi          = {10.1587/TRANSFUN.E96.A.92},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AbeOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FujisakiO13,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  title        = {Secure Integration of Asymmetric and Symmetric Encryption Schemes},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {1},
  pages        = {80--101},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-011-9114-1},
  doi          = {10.1007/S00145-011-9114-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FujisakiO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoT13,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Decentralized Attribute-Based Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_9},
  doi          = {10.1007/978-3-642-36362-7\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiyoshimaMO13,
  author       = {Susumu Kiyoshima and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {Constant-Round Black-Box Construction of Composable Multi-Party Computation
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/811},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiyoshimaMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/ManabeO12,
  author       = {Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {Meta-envy-free Cake-cutting and Pie-cutting Protocols},
  journal      = {J. Inf. Process.},
  volume       = {20},
  number       = {3},
  pages        = {686--693},
  year         = {2012},
  url          = {https://doi.org/10.2197/ipsjjip.20.686},
  doi          = {10.2197/IPSJJIP.20.686},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/ManabeO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoT12,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {349--366},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_22},
  doi          = {10.1007/978-3-642-34961-4\_22},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoT12,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {591--608},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_35},
  doi          = {10.1007/978-3-642-29011-4\_35},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KiyoshimaMO12,
  author       = {Susumu Kiyoshima and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation
                  Security},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {216--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_14},
  doi          = {10.1007/978-3-642-34117-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KiyoshimaMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1202-4507,
  author       = {Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Johannes Reich and
                  Bernd Finkbeiner},
  title        = {A Cryptographic Moving-Knife Cake-Cutting Protocol},
  booktitle    = {Proceedings Second International Workshop on Interactions, Games and
                  Protocols, {IWIGP} 2012, Tallinn, Estonia, 25th March 2012},
  series       = {{EPTCS}},
  volume       = {78},
  pages        = {15--23},
  year         = {2012},
  url          = {https://doi.org/10.4204/EPTCS.78.2},
  doi          = {10.4204/EPTCS.78.2},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-4507.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT12,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/MoriyamaO11,
  author       = {Daisuke Moriyama and
                  Tatsuaki Okamoto},
  title        = {An eCK-secure Authenticated Key Exchange Protocol without Random Oracles},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {607--625},
  year         = {2011},
  url          = {https://doi.org/10.3837/tiis.2011.03.009},
  doi          = {10.3837/TIIS.2011.03.009},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/MoriyamaO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Some Key Techniques on Pairing Vector Spaces},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {380--382},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_25},
  doi          = {10.1007/978-3-642-21969-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure
                  General Inner-Product Encryption},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {138--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_11},
  doi          = {10.1007/978-3-642-25513-7\_11},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoriyamaO11,
  author       = {Daisuke Moriyama and
                  Tatsuaki Okamoto},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Leakage resilient eCK-secure key exchange protocol without random
                  oracles},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {441--447},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966976},
  doi          = {10.1145/1966913.1966976},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoriyamaO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MitsunagaMO11,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_4},
  doi          = {10.1007/978-3-642-25141-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MitsunagaMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Efficient Attribute-Based Signatures for Non-monotone Predicates in
                  the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_3},
  doi          = {10.1007/978-3-642-19379-8\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11a,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure
                  General Inner-Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11b,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in
                  the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11c,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Decentralized Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbeKO10,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  title        = {Chosen Ciphertext Security with Optimal Ciphertext Overhead},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {22--33},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.22},
  doi          = {10.1587/TRANSFUN.E93.A.22},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AbeKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoT10,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Tal Rabin},
  title        = {Fully Secure Functional Encryption with General Relations from the
                  Decisional Linear Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_11},
  doi          = {10.1007/978-3-642-14623-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  editor       = {Henri Gilbert},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_4},
  doi          = {10.1007/978-3-642-13190-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MitsunagaMO10,
  author       = {Takuho Mitsunaga and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_11},
  doi          = {10.1007/978-3-642-16825-3\_11},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/MitsunagaMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/ManabeO10,
  author       = {Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Petr Hlinen{\'{y}} and
                  Anton{\'{\i}}n Kucera},
  title        = {Meta-Envy-Free Cake-Cutting Protocols},
  booktitle    = {Mathematical Foundations of Computer Science 2010, 35th International
                  Symposium, {MFCS} 2010, Brno, Czech Republic, August 23-27, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6281},
  pages        = {501--512},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15155-2\_44},
  doi          = {10.1007/978-3-642-15155-2\_44},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mfcs/ManabeO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT10,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Functional Encryption with General Relations from the
                  Decisional Linear Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoT09,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Mitsuru Matsui},
  title        = {Hierarchical Predicate Encryption for Inner-Products},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_13},
  doi          = {10.1007/978-3-642-10366-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeKO09,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Compact CCA-Secure Encryption for Messages of Arbitrary Length},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_21},
  doi          = {10.1007/978-3-642-00468-1\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MoriyamaO09,
  author       = {Daisuke Moriyama and
                  Tatsuaki Okamoto},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_14},
  doi          = {10.1007/978-3-642-04642-1\_14},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/MoriyamaO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiMO08,
  author       = {Ryo Nishimaki and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {Universally Composable Identity-Based Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {262--271},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.262},
  doi          = {10.1093/IETFEC/E91-A.1.262},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NagaoMO08,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {On the Equivalence of Several Security Notions of {KEM} and {DEM}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {283--297},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.283},
  doi          = {10.1093/IETFEC/E91-A.1.283},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NagaoMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/OkadaMO08,
  author       = {Yusuke Okada and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {An optimistic fair exchange protocol and its security in the universal
                  composability framework},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {70--77},
  year         = {2008},
  url          = {http://www.inderscience.com/filter.php?aid=17052},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/OkadaMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeKO08,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  editor       = {Josef Pieprzyk},
  title        = {Chosen Ciphertext Security with Optimal Ciphertext Overhead},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {355--371},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_22},
  doi          = {10.1007/978-3-540-89255-7\_22},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AkagiMO08,
  author       = {Norio Akagi and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Gene Tsudik},
  title        = {An Efficient Anonymous Credential System},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {272--286},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_25},
  doi          = {10.1007/978-3-540-85230-8\_25},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AkagiMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/OkamotoT08,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Homomorphic Encryption and Signatures from Vector Decomposition},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_4},
  doi          = {10.1007/978-3-540-85538-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/OkamotoT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NagaoMO08,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Relationship of Three Cryptographic Channels in the {UC} Framework},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_19},
  doi          = {10.1007/978-3-540-88733-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NagaoMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ManabeO08,
  author       = {Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Anonymous return route information for onion based mix-nets},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1461464.1461466},
  doi          = {10.1145/1461464.1461466},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ManabeO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeKO08,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  title        = {Chosen Ciphertext Security with Optimal Ciphertext Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Okamoto07,
  author       = {Tatsuaki Okamoto},
  editor       = {Kaoru Kurosawa},
  title        = {Authenticated Key Exchange and Key Encapsulation in the Standard Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {474--484},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_29},
  doi          = {10.1007/978-3-540-76900-2\_29},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Okamoto07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2007,
  editor       = {Feng Bao and
                  San Ling and
                  Tatsuaki Okamoto and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {Cryptology and Network Security, 6th International Conference, {CANS}
                  2007, Singapore, December 8-10, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4856},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76969-9},
  doi          = {10.1007/978-3-540-76969-9},
  isbn         = {978-3-540-76968-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2007,
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5},
  doi          = {10.1007/978-3-540-73489-5},
  isbn         = {978-3-540-73488-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8},
  doi          = {10.1007/978-3-540-71677-8},
  isbn         = {978-3-540-71676-1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Okamoto07,
  author       = {Tatsuaki Okamoto},
  title        = {Authenticated Key Exchange and Key Encapsulation Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Okamoto07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NagaoMO06,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {A Universally Composable Secure Channel Based on the {KEM-DEM} Framework},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {28--38},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.28},
  doi          = {10.1093/IETFEC/E89-A.1.28},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NagaoMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/Okamoto06,
  author       = {Tatsuaki Okamoto},
  editor       = {Marc P. C. Fossorier and
                  Hideki Imai and
                  Shu Lin and
                  Alain Poli},
  title        = {Cryptography Based on Bilinear Maps},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  16th International Symposium, AAECC-16, Las Vegas, NV, USA, February
                  20-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3857},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11617983\_3},
  doi          = {10.1007/11617983\_3},
  timestamp    = {Thu, 10 Sep 2020 17:39:08 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/Okamoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Okamoto06,
  author       = {Tatsuaki Okamoto},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Efficient Blind and Partially Blind Signatures Without Random Oracles},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {80--99},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_5},
  doi          = {10.1007/11681878\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Okamoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/Okamoto06,
  author       = {Tatsuaki Okamoto},
  editor       = {Phong Q. Nguyen},
  title        = {On Pairing-Based Cryptosystems},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {50--66},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_4},
  doi          = {10.1007/11958239\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/Okamoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/NishimakiMO06,
  author       = {Ryo Nishimaki and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Phong Q. Nguyen},
  title        = {Universally Composable Identity-Based Encryption},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {337--353},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_23},
  doi          = {10.1007/11958239\_23},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/NishimakiMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Okamoto06,
  author       = {Tatsuaki Okamoto},
  title        = {Efficient Blind and Partially Blind Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Okamoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagaoMO06,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {On the Equivalence of Several Security Notions of Key Encapsulation
                  Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NagaoMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangMO05,
  author       = {Chung{-}Huang Yang and
                  Hikaru Morita and
                  Tatsuaki Okamoto},
  title        = {Security and Performance Evaluation of {ESIGN} and {RSA} on {IC} Cards
                  by Using Byte-Unit Modular Algorithms},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {3},
  pages        = {1244--1248},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.3.1244},
  doi          = {10.1093/IETCOM/E88-B.3.1244},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangMO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Okamoto05,
  author       = {Tatsuaki Okamoto},
  title        = {Relationship of three cryptographic channels in the {UC} framework},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {73},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543960},
  doi          = {10.1109/ITWTPI.2005.1543960},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Okamoto05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NagaoMO05,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Joe Kilian},
  title        = {A Universally Composable Secure Channel Based on the {KEM-DEM} Framework},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {426--444},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_23},
  doi          = {10.1007/978-3-540-30576-7\_23},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/NagaoMO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0503091,
  author       = {Tatsuaki Okamoto and
                  Ryo Kashima},
  title        = {Resource Bounded Unprovability of Computational Lower Bounds},
  journal      = {CoRR},
  volume       = {abs/cs/0503091},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0503091},
  eprinttype    = {arXiv},
  eprint       = {cs/0503091},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0503091.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FujisakiOPS04,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  title        = {{RSA-OAEP} Is Secure under the {RSA} Assumption},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {2},
  pages        = {81--104},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00145-002-0204-y},
  doi          = {10.1007/S00145-002-0204-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FujisakiOPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiOT04,
  author       = {Ryotaro Hayashi and
                  Tatsuaki Okamoto and
                  Keisuke Tanaka},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {An {RSA} Family of Trap-Door Permutations with a Common Domain and
                  Its Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {291--304},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_21},
  doi          = {10.1007/978-3-540-24632-9\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2004,
  editor       = {Tatsuaki Okamoto},
  title        = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95630},
  doi          = {10.1007/B95630},
  isbn         = {3-540-20996-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoS03,
  author       = {Tatsuaki Okamoto and
                  Jacques Stern},
  editor       = {Chi{-}Sung Laih},
  title        = {Almost Uniform Density of Power Residues and the Provable Security
                  of {ESIGN}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {287--301},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_17},
  doi          = {10.1007/978-3-540-40061-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoK03,
  author       = {Tatsuaki Okamoto and
                  Ryo Kashima},
  title        = {Resource Bounded Unprovability of Computational Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/AbeO02,
  author       = {Masayuki Abe and
                  Tatsuaki Okamoto},
  title        = {Delegation Chains Secure up to Constant Length},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {1},
  pages        = {110--116},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_110},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/AbeO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FujisakiOPS01,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  editor       = {Joe Kilian},
  title        = {{RSA-OAEP} Is Secure under the {RSA} Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_16},
  doi          = {10.1007/3-540-44647-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FujisakiOPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OkamotoP01,
  author       = {Tatsuaki Okamoto and
                  David Pointcheval},
  editor       = {David Naccache},
  title        = {{REACT:} Rapid Enhanced-Security Asymmetric Cryptosystem Transform},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_13},
  doi          = {10.1007/3-540-45353-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OkamotoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoP01,
  author       = {Tatsuaki Okamoto and
                  David Pointcheval},
  editor       = {Kwangjo Kim},
  title        = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic
                  Schemes},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_8},
  doi          = {10.1007/3-540-44586-2\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2001,
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7},
  doi          = {10.1007/3-540-45600-7},
  isbn         = {3-540-42880-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/Okamoto00,
  author       = {Tatsuaki Okamoto},
  title        = {On Relationships between Statistical Zero-Knowledge Proofs},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {60},
  number       = {1},
  pages        = {47--108},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1664},
  doi          = {10.1006/JCSS.1999.1664},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/Okamoto00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoTU00,
  author       = {Tatsuaki Okamoto and
                  Keisuke Tanaka and
                  Shigenori Uchiyama},
  editor       = {Mihir Bellare},
  title        = {Quantum Public-Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {147--165},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_9},
  doi          = {10.1007/3-540-44598-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoTU00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeO00,
  author       = {Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Mihir Bellare},
  title        = {Provably Secure Partially Blind Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {271--286},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_17},
  doi          = {10.1007/3-540-44598-6\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor       = {Tatsuaki Okamoto},
  title        = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3},
  doi          = {10.1007/3-540-44448-3},
  isbn         = {3-540-41404-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiOPS00,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  title        = {{RSA-OAEP} is Secure under the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeO99,
  author       = {Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {A Signature Scheme with Message Recovery as Secure as Discrete Logarithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {378--389},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_30},
  doi          = {10.1007/978-3-540-48000-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FujisakiO99,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Michael J. Wiener},
  title        = {Secure Integration of Asymmetric and Symmetric Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {537--554},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_34},
  doi          = {10.1007/3-540-48405-1\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FujisakiO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AbeO99,
  author       = {Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Delegation Chains Secure up to Constant Length},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_13},
  doi          = {10.1007/978-3-540-47942-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/AbeO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OhkuboMAFO99,
  author       = {Miyako Ohkubo and
                  Fumiaki Miura and
                  Masayuki Abe and
                  Atsushi Fujioka and
                  Tatsuaki Okamoto},
  editor       = {Masahiro Mambo and
                  Yuliang Zheng},
  title        = {An Improvement on a Practical Secret Voting Scheme},
  booktitle    = {Information Security, Second International Workshop, ISW'99, Kuala
                  Lumpur, Malaysia, November 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1729},
  pages        = {225--234},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-47790-X\_19},
  doi          = {10.1007/3-540-47790-X\_19},
  timestamp    = {Thu, 02 Dec 2021 11:46:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/OhkuboMAFO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujisakiO99,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {How to Enhance the Security of Public-Key Encryption at Minimum Cost},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_5},
  doi          = {10.1007/3-540-49162-7\_5},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FujisakiO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaO98,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Hugo Krawczyk},
  title        = {On Concrete Security Treatment of Signatures Derived from Identification},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {354--369},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055741},
  doi          = {10.1007/BFB0055741},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FujisakiO98,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Kaisa Nyberg},
  title        = {A Practical and Provably Secure Scheme for Publicly Verifiable Secret
                  Sharing and Its Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054115},
  doi          = {10.1007/BFB0054115},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FujisakiO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoU98,
  author       = {Tatsuaki Okamoto and
                  Shigenori Uchiyama},
  editor       = {Kaisa Nyberg},
  title        = {A New Public-Key Cryptosystem as Secure as Factoring},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {308--318},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054135},
  doi          = {10.1007/BFB0054135},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoU98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoU98a,
  author       = {Tatsuaki Okamoto and
                  Shigenori Uchiyama},
  editor       = {Kaisa Nyberg},
  title        = {Security of an Identity-Based Cryptosystem and the Related Reductions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {546--560},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054153},
  doi          = {10.1007/BFB0054153},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoU98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Okamoto98,
  author       = {Tatsuaki Okamoto and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Lower Bounds on Term-Based Divisible Cash Systems},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {72--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054016},
  doi          = {10.1007/BFB0054016},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Okamoto98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FujisakiO97,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052225},
  doi          = {10.1007/BFB0052225},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FujisakiO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrescenzoOY97,
  author       = {Giovanni Di Crescenzo and
                  Tatsuaki Okamoto and
                  Moti Yung},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Keeping the SZK-Verifier Honest Unconditionally},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052226},
  doi          = {10.1007/BFB0052226},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrescenzoOY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Okamoto97,
  author       = {Tatsuaki Okamoto},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Receipt-Free Electronic Voting Schemes for Large Scale Elections},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028157},
  doi          = {10.1007/BFB0028157},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Okamoto97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Okamoto97a,
  author       = {Tatsuaki Okamoto},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Threshold Key-Recovery Systems for {RSA}},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028169},
  doi          = {10.1007/BFB0028169},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Okamoto97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1997,
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028456},
  doi          = {10.1007/BFB0028456},
  isbn         = {3-540-63696-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/Okamoto96,
  author       = {Tatsuaki Okamoto},
  editor       = {Nobuyoshi Terashima and
                  Edward Altman},
  title        = {An electronic voting scheme},
  booktitle    = {Advanced {IT} Tools, {IFIP} World Conference on {IT} Tools, 2-6 September
                  1996, Canberra, Australia.},
  pages        = {21--30},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Sun, 28 Jul 2019 13:03:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/Okamoto96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FujisakiO96,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {T. Mark A. Lomas},
  title        = {Practical Escrow Cash System},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_3},
  doi          = {10.1007/3-540-62494-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FujisakiO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Okamoto96,
  author       = {Tatsuaki Okamoto},
  editor       = {Gary L. Miller},
  title        = {On Relationships between Statistical Zero-Knowledge Proofs},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory
                  of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996},
  pages        = {649--658},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/237814.238016},
  doi          = {10.1145/237814.238016},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Okamoto96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardGOW95,
  author       = {Ivan Damg{\aa}rd and
                  Oded Goldreich and
                  Tatsuaki Okamoto and
                  Avi Wigderson},
  editor       = {Don Coppersmith},
  title        = {Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_26},
  doi          = {10.1007/3-540-44750-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardGOW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Okamoto95,
  author       = {Tatsuaki Okamoto},
  editor       = {Don Coppersmith},
  title        = {An Efficient Divisible Electronic Cash Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {438--451},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_35},
  doi          = {10.1007/3-540-44750-4\_35},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Okamoto95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SantisOP94,
  author       = {Alfredo De Santis and
                  Tatsuaki Okamoto and
                  Giuseppe Persiano},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Zero-Knowledge Proofs of Computational Power in the Shared String
                  Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {182--192},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000434},
  doi          = {10.1007/BFB0000434},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SantisOP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OkamotoO94,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {How to Simultaneously Exchange Secrets by General Assumptions},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {184--192},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191221},
  doi          = {10.1145/191177.191221},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OkamotoO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Okamoto94,
  author       = {Tatsuaki Okamoto},
  editor       = {Yvo Desmedt},
  title        = {Designated Confirmer Signatures and Public-Key Encryption are Equivalent},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_8},
  doi          = {10.1007/3-540-48658-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Okamoto94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/EngO94,
  author       = {Tony L. Eng and
                  Tatsuaki Okamoto},
  editor       = {Alfredo De Santis},
  title        = {Single-Term Divisible Electronic Coins},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {306--319},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053446},
  doi          = {10.1007/BFB0053446},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/EngO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MenezesOV93,
  author       = {Alfred Menezes and
                  Tatsuaki Okamoto and
                  Scott A. Vanstone},
  title        = {Reducing elliptic curve logarithms to logarithms in a finite field},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {5},
  pages        = {1639--1646},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.259647},
  doi          = {10.1109/18.259647},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MenezesOV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ParkKOT93,
  author       = {Choonsik Park and
                  Kaoru Kurosawa and
                  Tatsuaki Okamoto and
                  Shigeo Tsujii},
  editor       = {Tor Helleseth},
  title        = {On Key Distribution and Authentication in Mobile Radio Networks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {461--465},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_42},
  doi          = {10.1007/3-540-48285-7\_42},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ParkKOT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/Okamoto93,
  author       = {Tatsuaki Okamoto},
  editor       = {Kam{-}Wing Ng and
                  Prabhakar Raghavan and
                  N. V. Balasubramanian and
                  Francis Y. L. Chin},
  title        = {On the Relationship among Cryptographic Physical Assumptions},
  booktitle    = {Algorithms and Computation, 4th International Symposium, {ISAAC} '93,
                  Hong Kong, December 15-17, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {762},
  pages        = {369--378},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57568-5\_268},
  doi          = {10.1007/3-540-57568-5\_268},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/Okamoto93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FujiokaOO92,
  author       = {Atsushi Fujioka and
                  Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {A Practical Secret Voting Scheme for Large Scale Elections},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {244--251},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_66},
  doi          = {10.1007/3-540-57220-1\_66},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FujiokaOO92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Okamoto92,
  author       = {Tatsuaki Okamoto},
  editor       = {Ernest F. Brickell},
  title        = {Provably Secure and Practical Identification Schemes and Corresponding
                  Signature Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {31--53},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_3},
  doi          = {10.1007/3-540-48071-4\_3},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Okamoto92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoFF92,
  author       = {Tatsuaki Okamoto and
                  Atsushi Fujioka and
                  Eiichiro Fujisaki},
  editor       = {Ernest F. Brickell},
  title        = {An Efficient Digital Signature Scheme Based on an Elliptic Curve Over
                  the Ring Z\({}_{\mbox{n}}\)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_4},
  doi          = {10.1007/3-540-48071-4\_4},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoFF92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OhtaOF92,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto and
                  Atsushi Fujioka},
  editor       = {Rainer A. Rueppel},
  title        = {Secure Bit Commitment Function against Divertibility},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {324--340},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_27},
  doi          = {10.1007/3-540-47555-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OhtaOF92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoSS92,
  author       = {Tatsuaki Okamoto and
                  Kouichi Sakurai and
                  Hiroki Shizuya},
  editor       = {Rainer A. Rueppel},
  title        = {How Intractable Is the Discrete Logarithm for a General Finite Group?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {420--428},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_34},
  doi          = {10.1007/3-540-47555-9\_34},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoSS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OhtaO91,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {139--148},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_11},
  doi          = {10.1007/3-540-57332-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OhtaO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Okamoto91,
  author       = {Tatsuaki Okamoto},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {An Extensin of Zero-Knowledge Proofs and Its Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {368--381},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_32},
  doi          = {10.1007/3-540-57332-1\_32},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Okamoto91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoyamaMOV91,
  author       = {Kenji Koyama and
                  Ueli M. Maurer and
                  Tatsuaki Okamoto and
                  Scott A. Vanstone},
  editor       = {Joan Feigenbaum},
  title        = {New Public-Key Schemes Based on Elliptic Curves over the Ring Z\({}_{\mbox{n}}\)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_20},
  doi          = {10.1007/3-540-46766-1\_20},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoyamaMOV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoS91,
  author       = {Tatsuaki Okamoto and
                  Kouichi Sakurai},
  editor       = {Joan Feigenbaum},
  title        = {Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_21},
  doi          = {10.1007/3-540-46766-1\_21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO91,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Joan Feigenbaum},
  title        = {Universal Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {324--337},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_27},
  doi          = {10.1007/3-540-46766-1\_27},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91,
  author       = {Tatsuaki Okamoto and
                  David Chaum and
                  Kazuo Ohta},
  editor       = {Donald W. Davies},
  title        = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_8},
  doi          = {10.1007/3-540-46416-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FujiokaOO91,
  author       = {Atsushi Fujioka and
                  Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Donald W. Davies},
  title        = {Interactive Bi-Proof Systems and Undeniable Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_21},
  doi          = {10.1007/3-540-46416-6\_21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FujiokaOO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FujiokaOM91,
  author       = {Atsushi Fujioka and
                  Tatsuaki Okamoto and
                  Shoji Miyaguchi},
  editor       = {Donald W. Davies},
  title        = {{ESIGN:} An Efficient Digital Signature Implementation for Smard Cards},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {446--457},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_38},
  doi          = {10.1007/3-540-46416-6\_38},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FujiokaOM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MenezesVO91,
  author       = {Alfred Menezes and
                  Scott A. Vanstone and
                  Tatsuaki Okamoto},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103434},
  doi          = {10.1145/103418.103434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/MenezesVO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Okamoto90,
  author       = {Tatsuaki Okamoto},
  title        = {A fast signature scheme based on congruential polynomial operations},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {36},
  number       = {1},
  pages        = {47--53},
  year         = {1990},
  url          = {https://doi.org/10.1109/18.50373},
  doi          = {10.1109/18.50373},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Okamoto90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO90,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {How to Utilize the Randomness of Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {456--475},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_33},
  doi          = {10.1007/3-540-38424-3\_33},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OhtaOK90,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto and
                  Kenji Koyama},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Membership Authentication for Hierarchical Multigroups Using the Extended
                  Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {446--457},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_40},
  doi          = {10.1007/3-540-46877-3\_40},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OhtaOK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO89,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Gilles Brassard},
  title        = {Disposable Zero-Knowledge Authentications and Their Applications to
                  Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {481--496},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_43},
  doi          = {10.1007/0-387-34805-0\_43},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoO89,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Divertible Zero Knowledge Interactive Proofs and Commutative Random
                  Self-Reducibility},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_16},
  doi          = {10.1007/3-540-46885-4\_16},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/Okamoto88,
  author       = {Tatsuaki Okamoto},
  title        = {A Digital Multisignature Schema Using Bijective Public-Key Cryptosystems},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {432--441},
  year         = {1988},
  url          = {https://doi.org/10.1145/48012.48246},
  doi          = {10.1145/48012.48246},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocs/Okamoto88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaO88,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Shafi Goldwasser},
  title        = {A Modification of the Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_17},
  doi          = {10.1007/0-387-34799-2\_17},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaO88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/Okamoto87,
  author       = {Tatsuaki Okamoto},
  title        = {A single public-key authentication scheme for multiple users},
  journal      = {Syst. Comput. Jpn.},
  volume       = {18},
  number       = {10},
  pages        = {14--24},
  year         = {1987},
  url          = {https://doi.org/10.1002/scj.4690181002},
  doi          = {10.1002/SCJ.4690181002},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/Okamoto87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/OkamotoS86,
  author       = {Tatsuaki Okamoto and
                  Akira Shiraishi},
  title        = {A digital signature scheme based on polynomial operations},
  journal      = {Syst. Comput. Jpn.},
  volume       = {17},
  number       = {5},
  pages        = {36--44},
  year         = {1986},
  url          = {https://doi.org/10.1002/scj.4690170505},
  doi          = {10.1002/SCJ.4690170505},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/OkamotoS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SuzukiMTKO86,
  author       = {Ichiro Suzuki and
                  Y. Motohashi and
                  Kenichi Taniguchi and
                  Tadao Kasami and
                  Tatsuaki Okamoto},
  title        = {Specification and Verification of Decentralized Daisy Chain Arbiters
                  with omega-Extended Regular Expressions},
  journal      = {Theor. Comput. Sci.},
  volume       = {43},
  pages        = {277--291},
  year         = {1986},
  url          = {https://doi.org/10.1016/0304-3975(86)90181-7},
  doi          = {10.1016/0304-3975(86)90181-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SuzukiMTKO86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics