Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Allison Bishop, T. Okamoto, A. Sahai, K. Takashima, Brent Waters
- Computer Science, MathematicsEUROCRYPT
- 30 May 2010
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for…
A Practical Secret Voting Scheme for Large Scale Elections
- A. Fujioka, T. Okamoto, K. Ohta
- Computer Science, EconomicsAUSCRYPT
- 13 December 1992
TLDR
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- T. Okamoto, K. Takashima
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 15 August 2010
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by nonmonotone access structures combined with inner-product relations. The security…
Reducing elliptic curve logarithms to logarithms in a finite field
- A. Menezes, S. Vanstone, T. Okamoto
- Mathematics, Computer ScienceSTOC '91
- 3 January 1991
TLDR
Secure Integration of Asymmetric and Symmetric Encryption Schemes
- E. Fujisaki, T. Okamoto
- Computer Science, MathematicsJournal of Cryptology
- 15 August 1999
TLDR
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
- T. Okamoto
- Computer Science, MathematicsCRYPTO
- 16 August 1992
TLDR
A New Public-Key Cryptosystem as Secure as Factoring
- T. Okamoto, S. Uchiyama
- Computer Science, MathematicsEUROCRYPT
- 31 May 1998
TLDR
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations
- E. Fujisaki, T. Okamoto
- Mathematics, Computer ScienceCRYPTO
- 17 August 1997
This paper proposes a bit commitment scheme, BC(·), and efficient statistical zero knowledge (in short, SZK) protocols in which, for any given multi-variable polynomial f(X 1,..,X t) and any given…
Hierarchical Predicate Encryption for Inner-Products
- T. Okamoto, K. Takashima
- Computer Science, MathematicsASIACRYPT
- 2 December 2009
TLDR
How to Enhance the Security of Public-Key Encryption at Minimum Cost
- E. Fujisaki, T. Okamoto
- Computer Science, MathematicsPublic Key Cryptography
- 1 March 1999
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure) public-key…
...
...