Cryptographers' World
 

Tatsuaki Okamoto


Author's Web Page Link

50 papers in database with 5136 citations StarStarStarStar

Editor of 3 conference proceedings books

H-number: 28

Conference Proceedings

 
1. Tatsuaki OkamotoXiaoyun Wang, editors, Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings. Springer, 2007. ISBN 3-540-71676-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Tatsuaki Okamoto, editor, Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Springer, 2004. ISBN 3-540-20996-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Tatsuaki Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings. Springer, 2000. ISBN 3-540-41404-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Eiichiro Fujisaki,  Tatsuaki Okamoto,  David Pointcheval,  Jacques Stern,  RSA-OAEP Is Secure under the RSA Assumption, Journal of Cryptology, Volume 17(2), pp. 81 - 104, Springer, 2004.

[Cited 212 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Tatsuaki Okamoto,  Katsuyuki Takashima,  Hierarchical Predicate Encryption for Inner-Products, pp. 214 - 231, ASIACRYPT 2009.

[Electronic Edition][Cited 13 times ]

2. Masayuki Abe,  Eike Kiltz,  Tatsuaki Okamoto,  Compact CCA-Secure Encryption for Messages of Arbitrary Length, pp. 377 - 392, PKC 2009.

[Electronic Edition][Cited 8 times ]

3. Masayuki Abe,  Eike Kiltz,  Tatsuaki Okamoto,  Chosen Ciphertext Security with Optimal Ciphertext Overhead, pp. 355 - 371, ASIACRYPT 2008.

[Electronic Edition][Cited 8 times ]

4. Tatsuaki Okamoto,  Authenticated Key Exchange and Key Encapsulation in the Standard Model, pp. 474 - 484, ASIACRYPT 2007.

[Electronic Edition][Cited 21 times ]

5. Ryo Nishimaki,  Yoshifumi Manabe,  Tatsuaki Okamoto,  Universally Composable Identity-Based Encryption, pp. 337 - 353, VIETCRYPT 2006.

[Electronic Edition][Cited 2 times ]

6. Tatsuaki Okamoto,  On Pairing-Based Cryptosystems, pp. 50 - 66, VIETCRYPT 2006.

[Electronic Edition][Cited 2 times ]

7. Tatsuaki Okamoto,  Efficient Blind and Partially Blind Signatures Without Random Oracles, pp. 80 - 99, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 83 times Red Star]

8. Waka Nagao,  Yoshifumi Manabe,  Tatsuaki Okamoto,  A Universally Composable Secure Channel Based on the KEM-DEM Framework, pp. 426 - 444, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

9. Ryotaro Hayashi,  Tatsuaki Okamoto,  Keisuke Tanaka,  An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications, pp. 291 - 304, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

10. Tatsuaki Okamoto,  Jacques Stern,  Almost Uniform Density of Power Residues and the Provable Security of ESIGN, pp. 287 - 301, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

11. Eiichiro Fujisaki,  Tatsuaki Okamoto,  David Pointcheval,  Jacques Stern,  RSA-OAEP Is Secure under the RSA Assumption, pp. 260 - 274, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 277 times Red StarRed StarRed Star]

12. Tatsuaki Okamoto,  David Pointcheval,  REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform, pp. 159 - 175, CT-RSA 2001.

[Electronic Edition][Cited 182 times Red StarRed Star]

13. Tatsuaki Okamoto,  David Pointcheval,  The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes, pp. 104 - 118, PKC 2001.

[Electronic Edition][Cited 306 times Red StarRed StarRed Star]

14. Masayuki Abe,  Tatsuaki Okamoto,  Provably Secure Partially Blind Signatures, pp. 271 - 286, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 133 times Red StarRed Star]

15. Tatsuaki Okamoto,  Keisuke Tanaka,  Shigenori Uchiyama,  Quantum Public-Key Cryptosystems, pp. 147 - 165, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 69 times Red Star]

16. Masayuki Abe,  Tatsuaki Okamoto,  A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, pp. 378 - 389, ASIACRYPT 1999.

[Electronic Edition][Cited 28 times ]

17. Eiichiro Fujisaki,  Tatsuaki Okamoto,  Secure Integration of Asymmetric and Symmetric Encryption Schemes, pp. 537 - 554, CRYPTO 1999.

[Electronic Edition][Cited 466 times Red StarRed StarRed Star]

18. Eiichiro Fujisaki,  Tatsuaki Okamoto,  How to Enhance the Security of Public-Key Encryption at Minimum Cost, pp. 53 - 68, PKC 1999.

[Electronic Edition][Cited 182 times Red StarRed Star]

19. Kazuo Ohta,  Tatsuaki Okamoto,  On Concrete Security Treatment of Signatures Derived from Identification, pp. 354 - 369, CRYPTO 1998.

[Electronic Edition][Cited 107 times Red StarRed Star]

20. Tatsuaki Okamoto,  Shigenori Uchiyama,  A New Public-Key Cryptosystem as Secure as Factoring, pp. 308 - 318, EUROCRYPT 1998.

[Electronic Edition][Cited 362 times Red StarRed StarRed Star]

21. Eiichiro Fujisaki,  Tatsuaki Okamoto,  A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications, pp. 32 - 46, EUROCRYPT 1998.

[Electronic Edition][Cited 99 times Red Star]

22. Tatsuaki Okamoto,  Shigenori Uchiyama,  Security of an Identity-Based Cryptosystem and the Related Reductions, pp. 546 - 560, EUROCRYPT 1998.

[Electronic Edition][Cited 10 times ]

23. Tatsuaki Okamoto,  Moti Yung,  Lower Bounds on Term-Based Divisible Cash Systems, pp. 72 - 82, PKC 1998.

[Electronic Edition][Cited 1 times ]

24. Giovanni Di Crescenzo,  Tatsuaki Okamoto,  Moti Yung,  Keeping the SZK-Verifier Honest Unconditionally, pp. 31 - 45, CRYPTO 1997.

[Electronic Edition][Cited 7 times ]

25. Eiichiro Fujisaki,  Tatsuaki Okamoto,  Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations, pp. 16 - 30, CRYPTO 1997.

[Electronic Edition][Cited 356 times Red StarRed StarRed Star]

26. Tatsuaki Okamoto,  An Efficient Divisible Electronic Cash Scheme, pp. 438 - 451, CRYPTO 1995.

[Electronic Edition][Cited 170 times Red StarRed Star]

27. Ivan Damgard,  Oded Goldreich,  Tatsuaki Okamoto,  Avi Wigderson,  Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs, pp. 325 - 338, CRYPTO 1995.

[Electronic Edition][Cited 30 times ]

28. Alfredo De Santis,  Tatsuaki Okamoto,  Giuseppe Persiano,  Zero-Knowledge Proofs of Computational Power in the Shared String Model, pp. 182 - 192, ASIACRYPT 1994.

[Electronic Edition][No citation]

29. Tatsuaki Okamoto,  Designated Confirmer Signatures and Public-Key Encryption are Equivalent, pp. 61 - 74, CRYPTO 1994.

[Electronic Edition][Cited 90 times Red Star]

30. Tony Eng,  Tatsuaki Okamoto,  Single-Term Divisible Electronic Coins, pp. 306 - 319, EUROCRYPT 1994.

[Electronic Edition][Cited 77 times Red Star]

31. Choonsik Park,  Kaoru Kurosawa,  Tatsuaki Okamoto,  Shigeo Tsujii,  On Key Distribution and Authentication in Mobile Radio Networks, pp. 461 - 465, EUROCRYPT 1993.

[Electronic Edition][Cited 46 times ]

32. Atsushi Fujioka,  Tatsuaki Okamoto,  Kazuo Ohta,  A Practical Secret Voting Scheme for Large Scale Elections, pp. 244 - 251, ASIACRYPT 1992.

[Electronic Edition][Cited 571 times Red StarRed StarRed StarRed Star]

33. Tatsuaki Okamoto,  Kouichi Sakurai,  Hiroki Shizuya,  How Intractable Is the Discrete Logarithm for a General Finite Group?, pp. 420 - 428, EUROCRYPT 1992.

[Electronic Edition][Cited 1 times ]

34. Kazuo Ohta,  Tatsuaki Okamoto,  Atsushi Fujioka,  Secure Bit Commitment Function against Divertibility, pp. 324 - 340, EUROCRYPT 1992.

[Electronic Edition][Cited 4 times ]

35. Tatsuaki Okamoto,  Atsushi Fujioka,  Eiichiro Fujisaki,  An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn, pp. 54 - 65, CRYPTO 1992.

[Electronic Edition][Cited 15 times ]

36. Tatsuaki Okamoto,  Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, pp. 31 - 53, CRYPTO 1992.

[Electronic Edition][Cited 383 times Red StarRed StarRed Star]

37. Kazuo Ohta,  Tatsuaki Okamoto,  A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, pp. 139 - 148, ASIACRYPT 1991.

[Electronic Edition][Cited 104 times Red StarRed Star]

38. Tatsuaki Okamoto,  An Extension of Zero-Knowledge Proofs and Its Applications, pp. 368 - 381, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

39. Kenji Koyama,  Ueli M. Maurer,  Tatsuaki Okamoto,  Scott A. Vanstone,  New Public-Key Schemes Based on Elliptic Curves over the Ring Z, pp. 252 - 266, CRYPTO 1991.

[Electronic Edition][Cited 145 times Red StarRed Star]

40. Tatsuaki Okamoto,  Kazuo Ohta,  Universal Electronic Cash, pp. 324 - 337, CRYPTO 1991.

[Electronic Edition][Cited 303 times Red StarRed StarRed Star]

41. Tatsuaki Okamoto,  Kouichi Sakurai,  Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems, pp. 267 - 278, CRYPTO 1991.

[Electronic Edition][Cited 8 times ]

42. Atsushi Fujioka,  Tatsuaki Okamoto,  Shoji Miyaguchi,  ESIGN: An Efficient Digital Signature Implementation for Smart Cards, pp. 446 - 457, EUROCRYPT 1991.

[Electronic Edition][Cited 46 times ]

43. Atsushi Fujioka,  Tatsuaki Okamoto,  Kazuo Ohta,  Interactive Bi-Proof Systems and Undeniable Signature Schemes, pp. 243 - 256, EUROCRYPT 1991.

[Electronic Edition][Cited 37 times ]

44. Tatsuaki Okamoto,  David Chaum,  Kazuo Ohta,  Direct Zero Knowledge Proofs of Computational Power in Five Rounds, pp. 96 - 105, EUROCRYPT 1991.

[Electronic Edition][Cited 3 times ]

45. Kazuo Ohta,  Tatsuaki Okamoto,  Kenji Koyama,  Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, pp. 446 - 457, EUROCRYPT 1990.

[Electronic Edition][Cited 19 times ]

46. Tatsuaki Okamoto,  Kazuo Ohta,  How to Utilize the Randomness of Zero-Knowledge Proofs, pp. 456 - 475, CRYPTO 1990.

[Electronic Edition][Cited 25 times ]

47. Tatsuaki Okamoto,  Kazuo Ohta,  Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, pp. 481 - 496, CRYPTO 1989.

[Electronic Edition][Cited 106 times Red StarRed Star]

48. Tatsuaki Okamoto,  Kazuo Ohta,  Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility, pp. 134 - 148, EUROCRYPT 1989.

[Electronic Edition][Cited 75 times Red Star]

49. Kazuo Ohta,  Tatsuaki Okamoto,  A Modification of the Fiat-Shamir Scheme, pp. 232 - 243, CRYPTO 1988.

[Electronic Edition][Cited 111 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...