Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tatsuaki Okamoto
@article{DBLP:journals/complexity/Okamoto22, author = {Tatsuaki Okamoto}, title = {A New Quantitative Definition of the Complexity of Organized Matters}, journal = {Complex.}, volume = {2022}, pages = {1889348:1--1889348:18}, year = {2022}, url = {https://doi.org/10.1155/2022/1889348}, doi = {10.1155/2022/1889348}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/Okamoto22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlawatugodaO22, author = {Janaka Alawatugoda and Tatsuaki Okamoto}, title = {Standard model leakage-resilient authenticated key exchange using inner-product extractors}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {1059--1079}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01028-0}, doi = {10.1007/S10623-022-01028-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlawatugodaO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DaiOY22, author = {Wei Dai and Tatsuaki Okamoto and Go Yamamoto}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Stronger Security and Generic Constructions for Adaptor Signatures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {52--77}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_3}, doi = {10.1007/978-3-031-22912-1\_3}, timestamp = {Mon, 09 Jan 2023 17:58:33 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/DaiOY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiOY22, author = {Wei Dai and Tatsuaki Okamoto and Go Yamamoto}, title = {Stronger Security and Generic Constructions for Adaptor Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1687}, year = {2022}, url = {https://eprint.iacr.org/2022/1687}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DaiOY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/DattaOT21, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {25--57}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0003}, doi = {10.1587/TRANSFUN.2020CIP0003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/DattaOT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaO21, author = {Janaka Alawatugoda and Tatsuaki Okamoto}, title = {Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2021}, url = {https://eprint.iacr.org/2021/861}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TomidaAO20, author = {Junichi Tomida and Masayuki Abe and Tatsuaki Okamoto}, title = {Efficient Inner Product Functional Encryption with Full-Hiding Security}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {33--40}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_33}, doi = {10.1587/TRANSFUN.2019CIP0003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TomidaAO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoT20, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Decentralized Attribute-Based Encryption and Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {41--73}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_41}, doi = {10.1587/TRANSFUN.2019CIP0008}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/DattaOT20, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {7}, pages = {1556--1597}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019ICP0001}, doi = {10.1587/TRANSINF.2019ICP0001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/DattaOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/OkamotoT19, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1491--1573}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9305-0}, doi = {10.1007/S00145-018-9305-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/OkamotoT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaOT19, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {127--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_5}, doi = {10.1007/978-3-030-17253-4\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaOT19, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2019}, url = {https://eprint.iacr.org/2019/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DattaOT18, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {640--672}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_22}, doi = {10.1007/978-3-030-03329-3\_22}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DattaOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DattaOT18, author = {Pratish Datta and Tatsuaki Okamoto and Junichi Tomida}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {245--277}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_9}, doi = {10.1007/978-3-319-76581-5\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DattaOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaOT18, author = {Pratish Datta and Tatsuaki Okamoto and Junichi Tomida}, title = {Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2018}, url = {http://eprint.iacr.org/2018/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaOT18a, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2018}, url = {https://eprint.iacr.org/2018/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaOT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FreitagGHKLOTW17, author = {Cody Freitag and Rishab Goyal and Susan Hohenberger and Venkata Koppula and Eysa Lee and Tatsuaki Okamoto and Jordan Tran and Brent Waters}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Signature Schemes with Randomized Verification}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {373--389}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_19}, doi = {10.1007/978-3-319-61204-1\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/FreitagGHKLOTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2017, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0}, doi = {10.1007/978-3-319-68637-0}, isbn = {978-3-319-68636-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiromasaAO16, author = {Ryo Hiromasa and Masayuki Abe and Tatsuaki Okamoto}, title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {1}, pages = {73--82}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.73}, doi = {10.1587/TRANSFUN.E99.A.73}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiromasaAO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoT16, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {1}, pages = {92--117}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.92}, doi = {10.1587/TRANSFUN.E99.A.92}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MitsunagaMO16, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {8}, pages = {1591--1599}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1591}, doi = {10.1587/TRANSFUN.E99.A.1591}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MitsunagaMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TomidaAO16, author = {Junichi Tomida and Masayuki Abe and Tatsuaki Okamoto}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {408--425}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_24}, doi = {10.1007/978-3-319-45871-7\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/TomidaAO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Okamoto16, author = {Tatsuaki Okamoto}, title = {A Unified Paradigm of Organized Complexity and Semantic Information Theory}, journal = {CoRR}, volume = {abs/1608.00941}, year = {2016}, url = {http://arxiv.org/abs/1608.00941}, eprinttype = {arXiv}, eprint = {1608.00941}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Okamoto16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OkamotoT15, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {725--771}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0131-1}, doi = {10.1007/S10623-015-0131-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OkamotoT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoT15, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Dual Pairing Vector Spaces and Their Applications}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {3--15}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.3}, doi = {10.1587/TRANSFUN.E98.A.3}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/ManabeOO15, author = {Yoshifumi Manabe and Risako Otsuka and Tatsuaki Okamoto}, title = {A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus}, journal = {J. Inf. Process.}, volume = {23}, number = {3}, pages = {299--304}, year = {2015}, url = {https://doi.org/10.2197/ipsjjip.23.299}, doi = {10.2197/IPSJJIP.23.299}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/ManabeOO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {121--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_6}, doi = {10.1007/978-3-662-48797-6\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HiromasaAO15, author = {Ryo Hiromasa and Masayuki Abe and Tatsuaki Okamoto}, editor = {Jonathan Katz}, title = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {699--715}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_31}, doi = {10.1007/978-3-662-46447-2\_31}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HiromasaAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7}, doi = {10.1007/978-3-662-47854-7}, isbn = {978-3-662-47853-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2015}, url = {http://eprint.iacr.org/2015/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/OkamotoT14, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {2}, number = {4}, pages = {409--421}, year = {2014}, url = {https://doi.org/10.1109/TCC.2014.2353053}, doi = {10.1109/TCC.2014.2353053}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/OkamotoT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiyoshimaMO14, author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Yehuda Lindell}, title = {Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {343--367}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_15}, doi = {10.1007/978-3-642-54242-8\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiyoshimaMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkamotoT13, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {42--52}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.42}, doi = {10.1587/TRANSFUN.E96.A.42}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkamotoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MitsunagaMO13, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {68--75}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.68}, doi = {10.1587/TRANSFUN.E96.A.68}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MitsunagaMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AbeOS13, author = {Masayuki Abe and Tatsuaki Okamoto and Koutarou Suzuki}, title = {Message Recovery Signature Schemes from Sigma-Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {92--100}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.92}, doi = {10.1587/TRANSFUN.E96.A.92}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AbeOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FujisakiO13, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, title = {Secure Integration of Asymmetric and Symmetric Encryption Schemes}, journal = {J. Cryptol.}, volume = {26}, number = {1}, pages = {80--101}, year = {2013}, url = {https://doi.org/10.1007/s00145-011-9114-1}, doi = {10.1007/S00145-011-9114-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FujisakiO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoT13, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Decentralized Attribute-Based Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {125--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_9}, doi = {10.1007/978-3-642-36362-7\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiyoshimaMO13, author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2013}, url = {http://eprint.iacr.org/2013/811}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiyoshimaMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/ManabeO12, author = {Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Meta-envy-free Cake-cutting and Pie-cutting Protocols}, journal = {J. Inf. Process.}, volume = {20}, number = {3}, pages = {686--693}, year = {2012}, url = {https://doi.org/10.2197/ipsjjip.20.686}, doi = {10.2197/IPSJJIP.20.686}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/ManabeO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoT12, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {349--366}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_22}, doi = {10.1007/978-3-642-34961-4\_22}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoT12, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {David Pointcheval and Thomas Johansson}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {591--608}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_35}, doi = {10.1007/978-3-642-29011-4\_35}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KiyoshimaMO12, author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {216--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_14}, doi = {10.1007/978-3-642-34117-5\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KiyoshimaMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1202-4507, author = {Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Johannes Reich and Bernd Finkbeiner}, title = {A Cryptographic Moving-Knife Cake-Cutting Protocol}, booktitle = {Proceedings Second International Workshop on Interactions, Games and Protocols, {IWIGP} 2012, Tallinn, Estonia, 25th March 2012}, series = {{EPTCS}}, volume = {78}, pages = {15--23}, year = {2012}, url = {https://doi.org/10.4204/EPTCS.78.2}, doi = {10.4204/EPTCS.78.2}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-4507.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT12, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2012}, url = {http://eprint.iacr.org/2012/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MoriyamaO11, author = {Daisuke Moriyama and Tatsuaki Okamoto}, title = {An eCK-secure Authenticated Key Exchange Protocol without Random Oracles}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {3}, pages = {607--625}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.03.009}, doi = {10.3837/TIIS.2011.03.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/MoriyamaO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Some Key Techniques on Pairing Vector Spaces}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {380--382}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_25}, doi = {10.1007/978-3-642-21969-6\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {138--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_11}, doi = {10.1007/978-3-642-25513-7\_11}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoriyamaO11, author = {Daisuke Moriyama and Tatsuaki Okamoto}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Leakage resilient eCK-secure key exchange protocol without random oracles}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {441--447}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966976}, doi = {10.1145/1966913.1966976}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoriyamaO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MitsunagaMO11, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {A Secure {M} + 1st Price Auction Protocol Based on Bit Slice Circuits}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {51--64}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_4}, doi = {10.1007/978-3-642-25141-2\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MitsunagaMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {35--52}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_3}, doi = {10.1007/978-3-642-19379-8\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2011}, url = {http://eprint.iacr.org/2011/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11a, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2011}, url = {http://eprint.iacr.org/2011/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11b, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2011}, url = {http://eprint.iacr.org/2011/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11c, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Decentralized Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2011}, url = {http://eprint.iacr.org/2011/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AbeKO10, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {22--33}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.22}, doi = {10.1587/TRANSFUN.E93.A.22}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AbeKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoT10, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Tal Rabin}, title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {191--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_11}, doi = {10.1007/978-3-642-14623-7\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, editor = {Henri Gilbert}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {62--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_4}, doi = {10.1007/978-3-642-13190-5\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/MitsunagaMO10, author = {Takuho Mitsunaga and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {149--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_11}, doi = {10.1007/978-3-642-16825-3\_11}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/MitsunagaMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/ManabeO10, author = {Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Petr Hlinen{\'{y}} and Anton{\'{\i}}n Kucera}, title = {Meta-Envy-Free Cake-Cutting Protocols}, booktitle = {Mathematical Foundations of Computer Science 2010, 35th International Symposium, {MFCS} 2010, Brno, Czech Republic, August 23-27, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6281}, pages = {501--512}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15155-2\_44}, doi = {10.1007/978-3-642-15155-2\_44}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfcs/ManabeO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT10, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2010}, url = {http://eprint.iacr.org/2010/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoT09, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Mitsuru Matsui}, title = {Hierarchical Predicate Encryption for Inner-Products}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {214--231}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_13}, doi = {10.1007/978-3-642-10366-7\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeKO09, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Compact CCA-Secure Encryption for Messages of Arbitrary Length}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {377--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_21}, doi = {10.1007/978-3-642-00468-1\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/MoriyamaO09, author = {Daisuke Moriyama and Tatsuaki Okamoto}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {154--167}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_14}, doi = {10.1007/978-3-642-04642-1\_14}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/MoriyamaO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiMO08, author = {Ryo Nishimaki and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Universally Composable Identity-Based Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {262--271}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.262}, doi = {10.1093/IETFEC/E91-A.1.262}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NagaoMO08, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {On the Equivalence of Several Security Notions of {KEM} and {DEM}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {283--297}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.283}, doi = {10.1093/IETFEC/E91-A.1.283}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NagaoMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/OkadaMO08, author = {Yusuke Okada and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {An optimistic fair exchange protocol and its security in the universal composability framework}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {70--77}, year = {2008}, url = {http://www.inderscience.com/filter.php?aid=17052}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/OkadaMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeKO08, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, editor = {Josef Pieprzyk}, title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {355--371}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_22}, doi = {10.1007/978-3-540-89255-7\_22}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AkagiMO08, author = {Norio Akagi and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Gene Tsudik}, title = {An Efficient Anonymous Credential System}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {272--286}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_25}, doi = {10.1007/978-3-540-85230-8\_25}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AkagiMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/OkamotoT08, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Homomorphic Encryption and Signatures from Vector Decomposition}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {57--74}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_4}, doi = {10.1007/978-3-540-85538-5\_4}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/OkamotoT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NagaoMO08, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Relationship of Three Cryptographic Channels in the {UC} Framework}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {268--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_19}, doi = {10.1007/978-3-540-88733-1\_19}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NagaoMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ManabeO08, author = {Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Anonymous return route information for onion based mix-nets}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1461464.1461466}, doi = {10.1145/1461464.1461466}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ManabeO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeKO08, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2008}, url = {http://eprint.iacr.org/2008/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Okamoto07, author = {Tatsuaki Okamoto}, editor = {Kaoru Kurosawa}, title = {Authenticated Key Exchange and Key Encapsulation in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {474--484}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_29}, doi = {10.1007/978-3-540-76900-2\_29}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Okamoto07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2007, editor = {Feng Bao and San Ling and Tatsuaki Okamoto and Huaxiong Wang and Chaoping Xing}, title = {Cryptology and Network Security, 6th International Conference, {CANS} 2007, Singapore, December 8-10, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4856}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76969-9}, doi = {10.1007/978-3-540-76969-9}, isbn = {978-3-540-76968-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2007, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5}, doi = {10.1007/978-3-540-73489-5}, isbn = {978-3-540-73488-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2007, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8}, doi = {10.1007/978-3-540-71677-8}, isbn = {978-3-540-71676-1}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Okamoto07, author = {Tatsuaki Okamoto}, title = {Authenticated Key Exchange and Key Encapsulation Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2007}, url = {http://eprint.iacr.org/2007/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Okamoto07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NagaoMO06, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {A Universally Composable Secure Channel Based on the {KEM-DEM} Framework}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {28--38}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.28}, doi = {10.1093/IETFEC/E89-A.1.28}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NagaoMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/Okamoto06, author = {Tatsuaki Okamoto}, editor = {Marc P. C. Fossorier and Hideki Imai and Shu Lin and Alain Poli}, title = {Cryptography Based on Bilinear Maps}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3857}, pages = {35--50}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11617983\_3}, doi = {10.1007/11617983\_3}, timestamp = {Thu, 10 Sep 2020 17:39:08 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/Okamoto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Okamoto06, author = {Tatsuaki Okamoto}, editor = {Shai Halevi and Tal Rabin}, title = {Efficient Blind and Partially Blind Signatures Without Random Oracles}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {80--99}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_5}, doi = {10.1007/11681878\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Okamoto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/Okamoto06, author = {Tatsuaki Okamoto}, editor = {Phong Q. Nguyen}, title = {On Pairing-Based Cryptosystems}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {50--66}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_4}, doi = {10.1007/11958239\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/Okamoto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/NishimakiMO06, author = {Ryo Nishimaki and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Phong Q. Nguyen}, title = {Universally Composable Identity-Based Encryption}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {337--353}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_23}, doi = {10.1007/11958239\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/NishimakiMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Okamoto06, author = {Tatsuaki Okamoto}, title = {Efficient Blind and Partially Blind Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2006}, url = {http://eprint.iacr.org/2006/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Okamoto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NagaoMO06, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {On the Equivalence of Several Security Notions of Key Encapsulation Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2006}, url = {http://eprint.iacr.org/2006/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NagaoMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangMO05, author = {Chung{-}Huang Yang and Hikaru Morita and Tatsuaki Okamoto}, title = {Security and Performance Evaluation of {ESIGN} and {RSA} on {IC} Cards by Using Byte-Unit Modular Algorithms}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {3}, pages = {1244--1248}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.3.1244}, doi = {10.1093/IETCOM/E88-B.3.1244}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YangMO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Okamoto05, author = {Tatsuaki Okamoto}, title = {Relationship of three cryptographic channels in the {UC} framework}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {73}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543960}, doi = {10.1109/ITWTPI.2005.1543960}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Okamoto05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NagaoMO05, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Joe Kilian}, title = {A Universally Composable Secure Channel Based on the {KEM-DEM} Framework}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {426--444}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_23}, doi = {10.1007/978-3-540-30576-7\_23}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/NagaoMO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0503091, author = {Tatsuaki Okamoto and Ryo Kashima}, title = {Resource Bounded Unprovability of Computational Lower Bounds}, journal = {CoRR}, volume = {abs/cs/0503091}, year = {2005}, url = {http://arxiv.org/abs/cs/0503091}, eprinttype = {arXiv}, eprint = {cs/0503091}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0503091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FujisakiOPS04, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {{RSA-OAEP} Is Secure under the {RSA} Assumption}, journal = {J. Cryptol.}, volume = {17}, number = {2}, pages = {81--104}, year = {2004}, url = {https://doi.org/10.1007/s00145-002-0204-y}, doi = {10.1007/S00145-002-0204-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FujisakiOPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiOT04, author = {Ryotaro Hayashi and Tatsuaki Okamoto and Keisuke Tanaka}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {An {RSA} Family of Trap-Door Permutations with a Common Domain and Its Applications}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {291--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_21}, doi = {10.1007/978-3-540-24632-9\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2004, editor = {Tatsuaki Okamoto}, title = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95630}, doi = {10.1007/B95630}, isbn = {3-540-20996-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoS03, author = {Tatsuaki Okamoto and Jacques Stern}, editor = {Chi{-}Sung Laih}, title = {Almost Uniform Density of Power Residues and the Provable Security of {ESIGN}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {287--301}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_17}, doi = {10.1007/978-3-540-40061-5\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoK03, author = {Tatsuaki Okamoto and Ryo Kashima}, title = {Resource Bounded Unprovability of Computational Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2003}, url = {http://eprint.iacr.org/2003/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/AbeO02, author = {Masayuki Abe and Tatsuaki Okamoto}, title = {Delegation Chains Secure up to Constant Length}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {110--116}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_110}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/AbeO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FujisakiOPS01, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, editor = {Joe Kilian}, title = {{RSA-OAEP} Is Secure under the {RSA} Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {260--274}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_16}, doi = {10.1007/3-540-44647-8\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FujisakiOPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OkamotoP01, author = {Tatsuaki Okamoto and David Pointcheval}, editor = {David Naccache}, title = {{REACT:} Rapid Enhanced-Security Asymmetric Cryptosystem Transform}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {159--175}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_13}, doi = {10.1007/3-540-45353-9\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OkamotoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OkamotoP01, author = {Tatsuaki Okamoto and David Pointcheval}, editor = {Kwangjo Kim}, title = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic Schemes}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {104--118}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_8}, doi = {10.1007/3-540-44586-2\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2001, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7}, doi = {10.1007/3-540-45600-7}, isbn = {3-540-42880-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/Okamoto00, author = {Tatsuaki Okamoto}, title = {On Relationships between Statistical Zero-Knowledge Proofs}, journal = {J. Comput. Syst. Sci.}, volume = {60}, number = {1}, pages = {47--108}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1664}, doi = {10.1006/JCSS.1999.1664}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/Okamoto00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoTU00, author = {Tatsuaki Okamoto and Keisuke Tanaka and Shigenori Uchiyama}, editor = {Mihir Bellare}, title = {Quantum Public-Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {147--165}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_9}, doi = {10.1007/3-540-44598-6\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoTU00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeO00, author = {Masayuki Abe and Tatsuaki Okamoto}, editor = {Mihir Bellare}, title = {Provably Secure Partially Blind Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {271--286}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_17}, doi = {10.1007/3-540-44598-6\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2000, editor = {Tatsuaki Okamoto}, title = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3}, doi = {10.1007/3-540-44448-3}, isbn = {3-540-41404-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujisakiOPS00, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {{RSA-OAEP} is Secure under the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2000}, url = {http://eprint.iacr.org/2000/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeO99, author = {Masayuki Abe and Tatsuaki Okamoto}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {A Signature Scheme with Message Recovery as Secure as Discrete Logarithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {378--389}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_30}, doi = {10.1007/978-3-540-48000-6\_30}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FujisakiO99, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Michael J. Wiener}, title = {Secure Integration of Asymmetric and Symmetric Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {537--554}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_34}, doi = {10.1007/3-540-48405-1\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FujisakiO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AbeO99, author = {Masayuki Abe and Tatsuaki Okamoto}, editor = {Vijay Varadharajan and Yi Mu}, title = {Delegation Chains Secure up to Constant Length}, booktitle = {Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1726}, pages = {144--156}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-47942-0\_13}, doi = {10.1007/978-3-540-47942-0\_13}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/AbeO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OhkuboMAFO99, author = {Miyako Ohkubo and Fumiaki Miura and Masayuki Abe and Atsushi Fujioka and Tatsuaki Okamoto}, editor = {Masahiro Mambo and Yuliang Zheng}, title = {An Improvement on a Practical Secret Voting Scheme}, booktitle = {Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1729}, pages = {225--234}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-47790-X\_19}, doi = {10.1007/3-540-47790-X\_19}, timestamp = {Thu, 02 Dec 2021 11:46:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/OhkuboMAFO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujisakiO99, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Hideki Imai and Yuliang Zheng}, title = {How to Enhance the Security of Public-Key Encryption at Minimum Cost}, booktitle = {Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan, March 1-3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1560}, pages = {53--68}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49162-7\_5}, doi = {10.1007/3-540-49162-7\_5}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FujisakiO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaO98, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Hugo Krawczyk}, title = {On Concrete Security Treatment of Signatures Derived from Identification}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {354--369}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055741}, doi = {10.1007/BFB0055741}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujisakiO98, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Kaisa Nyberg}, title = {A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {32--46}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054115}, doi = {10.1007/BFB0054115}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujisakiO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoU98, author = {Tatsuaki Okamoto and Shigenori Uchiyama}, editor = {Kaisa Nyberg}, title = {A New Public-Key Cryptosystem as Secure as Factoring}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {308--318}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054135}, doi = {10.1007/BFB0054135}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoU98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoU98a, author = {Tatsuaki Okamoto and Shigenori Uchiyama}, editor = {Kaisa Nyberg}, title = {Security of an Identity-Based Cryptosystem and the Related Reductions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {546--560}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054153}, doi = {10.1007/BFB0054153}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoU98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Okamoto98, author = {Tatsuaki Okamoto and Moti Yung}, editor = {Hideki Imai and Yuliang Zheng}, title = {Lower Bounds on Term-Based Divisible Cash Systems}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {72--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054016}, doi = {10.1007/BFB0054016}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Okamoto98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FujisakiO97, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {Burton S. Kaliski Jr.}, title = {Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {16--30}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052225}, doi = {10.1007/BFB0052225}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FujisakiO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrescenzoOY97, author = {Giovanni Di Crescenzo and Tatsuaki Okamoto and Moti Yung}, editor = {Burton S. Kaliski Jr.}, title = {Keeping the SZK-Verifier Honest Unconditionally}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {31--45}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052226}, doi = {10.1007/BFB0052226}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrescenzoOY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Okamoto97, author = {Tatsuaki Okamoto}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Receipt-Free Electronic Voting Schemes for Large Scale Elections}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {25--35}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028157}, doi = {10.1007/BFB0028157}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Okamoto97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Okamoto97a, author = {Tatsuaki Okamoto}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Threshold Key-Recovery Systems for {RSA}}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {191--200}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028169}, doi = {10.1007/BFB0028169}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Okamoto97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/1997, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028456}, doi = {10.1007/BFB0028456}, isbn = {3-540-63696-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip/Okamoto96, author = {Tatsuaki Okamoto}, editor = {Nobuyoshi Terashima and Edward Altman}, title = {An electronic voting scheme}, booktitle = {Advanced {IT} Tools, {IFIP} World Conference on {IT} Tools, 2-6 September 1996, Canberra, Australia.}, pages = {21--30}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Sun, 28 Jul 2019 13:03:48 +0200}, biburl = {https://dblp.org/rec/conf/ifip/Okamoto96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FujisakiO96, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {T. Mark A. Lomas}, title = {Practical Escrow Cash System}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {33--48}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_3}, doi = {10.1007/3-540-62494-5\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/FujisakiO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Okamoto96, author = {Tatsuaki Okamoto}, editor = {Gary L. Miller}, title = {On Relationships between Statistical Zero-Knowledge Proofs}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {649--658}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.238016}, doi = {10.1145/237814.238016}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Okamoto96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardGOW95, author = {Ivan Damg{\aa}rd and Oded Goldreich and Tatsuaki Okamoto and Avi Wigderson}, editor = {Don Coppersmith}, title = {Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {325--338}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_26}, doi = {10.1007/3-540-44750-4\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardGOW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Okamoto95, author = {Tatsuaki Okamoto}, editor = {Don Coppersmith}, title = {An Efficient Divisible Electronic Cash Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {438--451}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_35}, doi = {10.1007/3-540-44750-4\_35}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Okamoto95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SantisOP94, author = {Alfredo De Santis and Tatsuaki Okamoto and Giuseppe Persiano}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Zero-Knowledge Proofs of Computational Power in the Shared String Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {182--192}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000434}, doi = {10.1007/BFB0000434}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SantisOP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkamotoO94, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {How to Simultaneously Exchange Secrets by General Assumptions}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {184--192}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191221}, doi = {10.1145/191177.191221}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkamotoO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Okamoto94, author = {Tatsuaki Okamoto}, editor = {Yvo Desmedt}, title = {Designated Confirmer Signatures and Public-Key Encryption are Equivalent}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {61--74}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_8}, doi = {10.1007/3-540-48658-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Okamoto94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EngO94, author = {Tony L. Eng and Tatsuaki Okamoto}, editor = {Alfredo De Santis}, title = {Single-Term Divisible Electronic Coins}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {306--319}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053446}, doi = {10.1007/BFB0053446}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EngO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MenezesOV93, author = {Alfred Menezes and Tatsuaki Okamoto and Scott A. Vanstone}, title = {Reducing elliptic curve logarithms to logarithms in a finite field}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {5}, pages = {1639--1646}, year = {1993}, url = {https://doi.org/10.1109/18.259647}, doi = {10.1109/18.259647}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MenezesOV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkKOT93, author = {Choonsik Park and Kaoru Kurosawa and Tatsuaki Okamoto and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {On Key Distribution and Authentication in Mobile Radio Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {461--465}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_42}, doi = {10.1007/3-540-48285-7\_42}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkKOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/Okamoto93, author = {Tatsuaki Okamoto}, editor = {Kam{-}Wing Ng and Prabhakar Raghavan and N. V. Balasubramanian and Francis Y. L. Chin}, title = {On the Relationship among Cryptographic Physical Assumptions}, booktitle = {Algorithms and Computation, 4th International Symposium, {ISAAC} '93, Hong Kong, December 15-17, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {762}, pages = {369--378}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57568-5\_268}, doi = {10.1007/3-540-57568-5\_268}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/Okamoto93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FujiokaOO92, author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {A Practical Secret Voting Scheme for Large Scale Elections}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {244--251}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_66}, doi = {10.1007/3-540-57220-1\_66}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FujiokaOO92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Okamoto92, author = {Tatsuaki Okamoto}, editor = {Ernest F. Brickell}, title = {Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {31--53}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_3}, doi = {10.1007/3-540-48071-4\_3}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Okamoto92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoFF92, author = {Tatsuaki Okamoto and Atsushi Fujioka and Eiichiro Fujisaki}, editor = {Ernest F. Brickell}, title = {An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z\({}_{\mbox{n}}\)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {54--65}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_4}, doi = {10.1007/3-540-48071-4\_4}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoFF92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OhtaOF92, author = {Kazuo Ohta and Tatsuaki Okamoto and Atsushi Fujioka}, editor = {Rainer A. Rueppel}, title = {Secure Bit Commitment Function against Divertibility}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {324--340}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_27}, doi = {10.1007/3-540-47555-9\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OhtaOF92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoSS92, author = {Tatsuaki Okamoto and Kouichi Sakurai and Hiroki Shizuya}, editor = {Rainer A. Rueppel}, title = {How Intractable Is the Discrete Logarithm for a General Finite Group?}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {420--428}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_34}, doi = {10.1007/3-540-47555-9\_34}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoSS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OhtaO91, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {139--148}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_11}, doi = {10.1007/3-540-57332-1\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OhtaO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Okamoto91, author = {Tatsuaki Okamoto}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {An Extensin of Zero-Knowledge Proofs and Its Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {368--381}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_32}, doi = {10.1007/3-540-57332-1\_32}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Okamoto91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoyamaMOV91, author = {Kenji Koyama and Ueli M. Maurer and Tatsuaki Okamoto and Scott A. Vanstone}, editor = {Joan Feigenbaum}, title = {New Public-Key Schemes Based on Elliptic Curves over the Ring Z\({}_{\mbox{n}}\)}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {252--266}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_20}, doi = {10.1007/3-540-46766-1\_20}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoyamaMOV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoS91, author = {Tatsuaki Okamoto and Kouichi Sakurai}, editor = {Joan Feigenbaum}, title = {Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {267--278}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_21}, doi = {10.1007/3-540-46766-1\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO91, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Joan Feigenbaum}, title = {Universal Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {324--337}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_27}, doi = {10.1007/3-540-46766-1\_27}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91, author = {Tatsuaki Okamoto and David Chaum and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {96--105}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_8}, doi = {10.1007/3-540-46416-6\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujiokaOO91, author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Interactive Bi-Proof Systems and Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {243--256}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_21}, doi = {10.1007/3-540-46416-6\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujiokaOO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujiokaOM91, author = {Atsushi Fujioka and Tatsuaki Okamoto and Shoji Miyaguchi}, editor = {Donald W. Davies}, title = {{ESIGN:} An Efficient Digital Signature Implementation for Smard Cards}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {446--457}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_38}, doi = {10.1007/3-540-46416-6\_38}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujiokaOM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MenezesVO91, author = {Alfred Menezes and Scott A. Vanstone and Tatsuaki Okamoto}, editor = {Cris Koutsougeras and Jeffrey Scott Vitter}, title = {Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field}, booktitle = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, {USA}}, pages = {80--89}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/103418.103434}, doi = {10.1145/103418.103434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/MenezesVO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Okamoto90, author = {Tatsuaki Okamoto}, title = {A fast signature scheme based on congruential polynomial operations}, journal = {{IEEE} Trans. Inf. Theory}, volume = {36}, number = {1}, pages = {47--53}, year = {1990}, url = {https://doi.org/10.1109/18.50373}, doi = {10.1109/18.50373}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Okamoto90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO90, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {How to Utilize the Randomness of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {456--475}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_33}, doi = {10.1007/3-540-38424-3\_33}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OhtaOK90, author = {Kazuo Ohta and Tatsuaki Okamoto and Kenji Koyama}, editor = {Ivan Damg{\aa}rd}, title = {Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {446--457}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_40}, doi = {10.1007/3-540-46877-3\_40}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OhtaOK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO89, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Gilles Brassard}, title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {481--496}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_43}, doi = {10.1007/0-387-34805-0\_43}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoO89, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {134--148}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_16}, doi = {10.1007/3-540-46885-4\_16}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/Okamoto88, author = {Tatsuaki Okamoto}, title = {A Digital Multisignature Schema Using Bijective Public-Key Cryptosystems}, journal = {{ACM} Trans. Comput. Syst.}, volume = {6}, number = {4}, pages = {432--441}, year = {1988}, url = {https://doi.org/10.1145/48012.48246}, doi = {10.1145/48012.48246}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocs/Okamoto88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaO88, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Shafi Goldwasser}, title = {A Modification of the Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {232--243}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_17}, doi = {10.1007/0-387-34799-2\_17}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/Okamoto87, author = {Tatsuaki Okamoto}, title = {A single public-key authentication scheme for multiple users}, journal = {Syst. Comput. Jpn.}, volume = {18}, number = {10}, pages = {14--24}, year = {1987}, url = {https://doi.org/10.1002/scj.4690181002}, doi = {10.1002/SCJ.4690181002}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/Okamoto87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/OkamotoS86, author = {Tatsuaki Okamoto and Akira Shiraishi}, title = {A digital signature scheme based on polynomial operations}, journal = {Syst. Comput. Jpn.}, volume = {17}, number = {5}, pages = {36--44}, year = {1986}, url = {https://doi.org/10.1002/scj.4690170505}, doi = {10.1002/SCJ.4690170505}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/OkamotoS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SuzukiMTKO86, author = {Ichiro Suzuki and Y. Motohashi and Kenichi Taniguchi and Tadao Kasami and Tatsuaki Okamoto}, title = {Specification and Verification of Decentralized Daisy Chain Arbiters with omega-Extended Regular Expressions}, journal = {Theor. Comput. Sci.}, volume = {43}, pages = {277--291}, year = {1986}, url = {https://doi.org/10.1016/0304-3975(86)90181-7}, doi = {10.1016/0304-3975(86)90181-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SuzukiMTKO86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.