Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Allison Bishop, T. Okamoto, A. Sahai, K. Takashima, B. Waters
- Computer Science, Mathematics
- EUROCRYPT
- 30 May 2010
TLDR
A Practical Secret Voting Scheme for Large Scale Elections
- A. Fujioka, T. Okamoto, K. Ohta
- Computer Science
- AUSCRYPT
- 13 December 1992
TLDR
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- T. Okamoto, K. Takashima
- Computer Science, Mathematics
- IACR Cryptol. ePrint Arch.
- 15 August 2010
TLDR
Reducing elliptic curve logarithms to logarithms in a finite field
- A. Menezes, S. Vanstone, T. Okamoto
- Mathematics, Computer Science
- STOC '91
- 3 January 1991
TLDR
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
- T. Okamoto
- Mathematics, Computer Science
- CRYPTO
- 16 August 1992
TLDR
A New Public-Key Cryptosystem as Secure as Factoring
- T. Okamoto, S. Uchiyama
- Computer Science, Mathematics
- EUROCRYPT
- 31 May 1998
TLDR
Secure Integration of Asymmetric and Symmetric Encryption Schemes
- E. Fujisaki, T. Okamoto
- Computer Science, Mathematics
- Journal of Cryptology
- 2011
TLDR
How to Enhance the Security of Public-Key Encryption at Minimum Cost
- E. Fujisaki, T. Okamoto
- Computer Science
- Public Key Cryptography
- 1 March 1999
TLDR
Hierarchical Predicate Encryption for Inner-Products
- T. Okamoto, K. Takashima
- Mathematics, Computer Science
- ASIACRYPT
- 2 December 2009
TLDR
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
- T. Okamoto, D. Pointcheval
- Computer Science
- CT-RSA
- 8 April 2001
TLDR
...
1
2
3
4
5
...