Tatsuaki Okamoto
#133,655
Most Influential Person Now
Tatsuaki Okamoto's AcademicInfluence.com Rankings
Tatsuaki Okamotomathematics Degrees
Mathematics
#6367
World Rank
#8831
Historical Rank
Algebraic Geometry
#135
World Rank
#142
Historical Rank
Number Theory
#185
World Rank
#242
Historical Rank
Measure Theory
#1298
World Rank
#1640
Historical Rank

Download Badge
Computer Science Mathematics
Tatsuaki Okamoto's Degrees
- PhD Mathematics University of Tokyo
Why Is Tatsuaki Okamoto Influential?
(Suggest an Edit or Addition)Tatsuaki Okamoto's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Reducing elliptic curve logarithms to logarithms in a finite field (1991) (1419)
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption (2010) (1333)
- A Practical Secret Voting Scheme for Large Scale Elections (1992) (985)
- Secure Integration of Asymmetric and Symmetric Encryption Schemes (1999) (943)
- A New Public-Key Cryptosystem as Secure as Factoring (1998) (743)
- Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes (1992) (651)
- Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations (1997) (536)
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption (2010) (512)
- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes (2001) (492)
- Advances in Cryptology — ASIACRYPT 2000 (2000) (442)
- RSA-OAEP Is Secure under the RSA Assumption (2001) (420)
- How to Enhance the Security of Public-Key Encryption at Minimum Cost (1999) (336)
- Receipt-Free Electronic Voting Schemes for Large Scale Elections (1997) (311)
- Hierarchical Predicate Encryption for Inner-Products (2009) (285)
- REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform (2001) (265)
- Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (2007) (246)
- Provably Secure Partially Blind Signatures (2000) (245)
- An Efficient Divisible Electronic Cash Scheme (1995) (225)
- Universal Electronic Cash (1991) (210)
- Efficient Blind and Partially Blind Signatures Without Random Oracles (2006) (205)
- Topics in Cryptology – CT-RSA 2004 (2004) (193)
- Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model (2014) (188)
- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn (1991) (182)
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption (2012) (179)
- A digital multisignature scheme using bijective public-key cryptosystems (1988) (170)
- A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications (1998) (160)
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption (2012) (154)
- An Improvement on a Practical Secret Voting Scheme (1999) (152)
- Quantum Public-Key Cryptosystems (2000) (145)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (2011) (136)
- Decentralized Attribute-Based Signatures (2013) (135)
- Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (1989) (132)
- A Modification of the Fiat-Shamir Scheme (1988) (132)
- Homomorphic Encryption and Signatures from Vector Decomposition (2008) (131)
- On Concrete Security Treatment of Signatures Derived from Identification (1998) (131)
- A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme (1991) (125)
- An electronic voting scheme (1996) (114)
- Single-Term Divisible Electronic Coins (1994) (104)
- Designated Confirmer Signatures and Public-Key Encryption are Equivalent (1994) (104)
- On relationships between statistical zero-knowledge proofs (1996) (102)
- Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility (1990) (102)
- Authenticated Key Exchange and Key Encapsulation in the Standard Model (2007) (102)
- Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings (2007) (97)
- Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security) (1999) (86)
- How to simultaneously exchange secrets by general assumptions (1994) (78)
- Packing Messages and Optimizing Bootstrapping in GSW-FHE (2015) (77)
- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm (1999) (64)
- Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs (1995) (51)
- ESIGN: An Efficient Digital Signature Implementation for Smard Cards (1991) (51)
- On Key Distribution and Authentication in Mobile Radio Networks (1994) (47)
- A fast signature scheme based on congruential polynomial operations (1990) (46)
- Interactive Bi-Proof Systems and Undeniable Signature Schemes (1991) (40)
- An eCK-secure Authenticated Key Exchange Protocol without Random Oracles (2009) (38)
- Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption (2018) (37)
- EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a) (1998) (35)
- Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security (2016) (34)
- Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme (1991) (34)
- Leakage resilient eCK-secure key exchange protocol without random oracles (2011) (34)
- New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators (2015) (32)
- How to Utilize the Randomness of Zero-Knowledge Proofs (1990) (29)
- Advances in Cryptology — CRYPTO '98 (1998) (29)
- Practical Escrow Cash System (1996) (29)
- A Universally Composable Secure Channel Based on the KEM-DEM Framework (2005) (28)
- Almost Uniform Density of Power Residues and the Provable Security of ESIGN (2003) (27)
- An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications (2004) (25)
- Compact CCA-Secure Encryption for Messages of Arbitrary Length (2009) (25)
- An Efficient Anonymous Credential System (2008) (24)
- Cryptography Based on Bilinear Maps (2006) (24)
- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol (2014) (22)
- Chosen Ciphertext Security with Optimal Ciphertext Overhead (2008) (22)
- Security of an Identity-Based Cryptosystem and the Related Reductions (1998) (20)
- Threshold quantum cryptography (2005) (19)
- Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption (2013) (18)
- An optimistic fair exchange protocol and its security in the universal composability framework (2008) (16)
- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems (1991) (15)
- Threshold Key-Recovery Systems for RSA (1997) (15)
- PSEC : Provably Secure Elliptic Curve Encryption Scheme ( Submission to P 1363 a ) (1999) (14)
- An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn (1992) (13)
- Fast public-key cryptosystem using congruent polynomial equations (1986) (12)
- Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs (2019) (12)
- Optimistic Fair Exchange Protocol for E-Commerce (2006) (12)
- Delegation Chains Secure up to Constant Length (1999) (11)
- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption (2010) (11)
- Meta-Envy-Free Cake-Cutting Protocols (2010) (11)
- Homomorphic Signatures for Polynomial Functions with Shorter Signatures (2013) (11)
- Dual Pairing Vector Spaces and Their Applications (2015) (11)
- PSEC{3: Provably Secure Elliptic Curve Encryption Scheme { V3 (Submission to P1363a) (2000) (10)
- Keeping the SZK-Verifier Honest Unconditionally (1997) (10)
- Direct Zero Knowledge Proofs of Computational Power in Five Rounds (1991) (9)
- RSA{REACT: An Alternative to RSA{OAEP (2001) (9)
- Authenticated Key Exchange and Key Encapsulation Without Random Oracles (2007) (9)
- Secure Bit Commitment Function against Divertibility (1992) (9)
- On the Equivalence of Several Security Notions of Key Encapsulation Mechanism (2006) (9)
- One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (Special Section on Cryptography and Information Security) (1998) (8)
- A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring (2001) (8)
- Proceedings of the First International Conference on Information and Communication Security (1997) (8)
- A single public-key authentication scheme for multiple users (1987) (8)
- How Intractable Is the Discrete Logarithm for a General Finite Group? (1992) (7)
- Relationship of three cryptographic channels in the UC framework (2005) (7)
- Topics in cryptology - CT-RSA 2004 : the Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004 : proceedings (2004) (7)
- Decentralized Attribute-Based Encryption and Signatures (2020) (7)
- Short Group Signatures with Ecient Flexible Join (2006) (6)
- Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption (2018) (6)
- Universally Composable Identity-Based Encryption (2006) (6)
- On Pairing-Based Cryptosystems (2006) (6)
- Some Key Techniques on Pairing Vector Spaces (2011) (5)
- A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits (2011) (5)
- A Cryptographic Moving-Knife Cake-Cutting Protocol (2012) (4)
- Meta-envy-free Cake-cutting and Pie-cutting Protocols (2012) (4)
- Efficient Inner Product Functional Encryption with Full-Hiding Security (2020) (4)
- On the Relationship among Cryptographic Physical Assumptions (1993) (4)
- PSEC : Provably Secure Elliptic Curve Encryption Scheme ( Submission to NESSIE ) (2000) (4)
- Recent Topics of Public-Key Cryptography : 2. Provably Secure and Practical Public-Key Encryption (1999) (4)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (2015) (4)
- Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption (2018) (4)
- Specification and Verification of Decentralized Daisy Chain Arbiters with omega-Extended Regular Expressions (1986) (4)
- Key Size Evaluation of Provably Secure RSA-based Encryption Schemes (2006) (4)
- On the Equivalence of Several Security Notions of KEM and DEM (2008) (3)
- Practical Identification Schemes as Secure as the DL and RSA problems ( Submission to P 1363 a ) (2007) (3)
- Signature Schemes with Randomized Verification (2017) (3)
- Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings (2000) (3)
- Zero-Knowledge Proofs of Computational Power in the Shared String Model (1994) (3)
- New Cryptocurrency Protocol without Proof of Work (2015) (2)
- An Identity Based Encryption Scheme from Ideal Lattices (2011) (2)
- Proceedings of the First international conference on Pairing-Based Cryptography (2007) (2)
- Adaptively Secure Functional Encryption for Inner-Product Values (2016) (2)
- Financial cryptography and data security : 19th international conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, revised selected papers (2015) (2)
- Graph Non-Isomorphism Has a Succinct Quantum Certificate (2007) (2)
- An Extensin of Zero-Knowledge Proofs and Its Applications (1991) (2)
- Message Recovery Signature Schemes from Sigma-Protocols (2013) (2)
- CCA-Security with Optimal Ciphertext Overhead (2008) (2)
- Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms (2005) (2)
- An Extension of Zero-Knowledge Proofs and Its Applications. (1993) (2)
- Lottery Protocol for Cryptocurrency (2014) (2)
- Resource Bounded Unprovability of Computational Lower Bounds (2005) (2)
- A New Quantitative Definition of the Complexity of Organized Matters (2022) (1)
- Special Section on Cryptography and Information Security (2000) (1)
- Secure Integration of Asymmetric and Symmetric Encryption Schemes (2011) (1)
- Fast Implementation of Digital Signature Algorithms On Smartcards Without Coprocessor (2002) (1)
- Threshold quantum cryptography (5 pages) (2005) (1)
- Practical Escrow Cash Schemes (Special Section on Cryptography and Information Security) (1998) (1)
- Multilinear Maps on LWE (2013) (1)
- A digital signature scheme based on polynomial operations (1986) (1)
- A Simplied Private Stable Matching Algorithm (2011) (1)
- Universally Composable Mix-net, Blind Signatures and Voting (2006) (1)
- Lower Bounds on Term-Based Divisible Cash Systems (1998) (1)
- Anonymous return route information for onion based mix-nets (2008) (1)
- Standard model leakage-resilient authenticated key exchange using inner-product extractors (2022) (1)
- Abuses of undeniable signatures and their countermeasures (1991) (1)
- An EÆcient Anonymous Credential System (1)
- A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus (2015) (1)
- Security of the Extended Fiat-Shamir Schemes (Special Section on Cryptography and Information Security) (1998) (0)
- Researchers Value Passion and Knowledge, and Seek to Solve Problems at Hand and Those That Have Remained Unsolved for Many Years (2023) (0)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (0)
- Proxy Signatures for General Access Structures (2014) (0)
- Proceedings of the 1st international conference on Pairing-Based Cryptography: Pairing 2007 (2007) (0)
- Stronger Security and Generic Constructions for Adaptor Signatures (2022) (0)
- Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption (2018) (0)
- A Unified Paradigm of Organized Complexity and Semantic Information Theory (2016) (0)
- Zero-Knowledge Proofs and Multi-Party Protocols (1991) (0)
- Security Proof of Cryptographic Systems Using Universal Composability Theory (2009) (0)
- A Non-Interactive Identity-Based Cryptosystem (1997) (0)
- On the Performance of ESIGN and RSA on IC Cards (2003) (0)
- Provable Security of Practical Public-Key Encryption Systems (1998) (0)
- Standard model leakage-resilient authenticated key exchange using inner-product extractors (2022) (0)
- The Distributed Decryption Schemes for Somewhat Homomorphic Encryption (2011) (0)
- Trends in cryptography technologies and their future (2003) (0)
- A Note on Authenticated Key Exchange in Cryptocurrency (2015) (0)
- A method of introducing electronic money for an issuer electronic balance counters, corresponding device and memory element stored program for performing the method (1998) (0)
- Epoc: Ecient Probabilistic Public-key Encryption (submission to Nessie) (2007) (0)
- Resource Bounded Unprovability of Computational Lower Bounds (Part 1) (Algebraic Aspects of Coding Theory and Cryptography) (2004) (0)
- Selected Papers : Research Activities in Laboratories of New Fellows Part II Message Recovery Signature Schemes from Sigma-protocols (2008) (0)
- System for transmitting a signed document. (1985) (0)
- Proceedings of the 10th international conference on Cryptology and Network Security (2005) (0)
- On the Security of an Unlinkable O ff-line E-Cash System Yosuke Tomii (2008) (0)
- A Secure, Private Electronic Voting Implementation Using Blind Signatures (2002) (0)
- On the Security of an Unlinkable Off-line E-Cash System (2008) (0)
- Threshold Key-Recovery Systems for RSA (Special Section on Cryptography and Information Security) (1999) (0)
- Secure Bit Commitmentl Function against Divert ibili ty (2001) (0)
- Method and apparatus for representation of electronic money. (1990) (0)
- Tightly Secure Signatures from the RSA Assumption (2016) (0)
- Proceedings of the 10th international conference on Practice and theory in public-key cryptography (2007) (0)
- Key Exchange : Advent of Modern Cryptography and Its Advance (2008) (0)
- On the Arrow of Time and Organized Complexity in the Universe (2023) (0)
- Constant-Round Concurrent Zero-Knowledge in Super-Polynomial Simulation Security (2012) (0)
- Elliptic Curve Cryptosystems and Their Applications (1992) (0)
- NTT Technical Review, Jan. 2008, Vol. 6, No. 1 (2008) (0)
- Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings (1997) (0)
- Ecient Blind and Partially Blind Signatures without Random Oracles (2006) (0)
- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security (2012) (0)
- Method and apparatus for storing a secret key used in an RSA cryptosystem (1997) (0)
- Cryptographic Works of Dr. Kenji Koyama: In Memoria : Special Section on Cryptography and Information Security (2001) (0)
- Delegatio nChain sSecur eu pt oConstant Length (1999) (0)
- A method for controlling of credits with a chip card (1993) (0)
- Information and Communications Security (2001) (0)
- Instablity of a punishment strategy in correlated equilibria (2010) (0)
- Process for the settlement of accounts by means of chip cards (1993) (0)
- A method for implementing the use of electronic money (1992) (0)
- A Secure Signature Scheme with Tight Reduction to the RSA Assumption from Indistinguishability Obfuscation (2015) (0)
- Processing system code, device key generation, encoding device, decoding device, processing procedure code and code processing program (2011) (0)
- An Efficient Anonymous Credential System with Revocation (2008) (0)
- Universally Composable Blind Signatures (2006) (0)
- A Private Matching Algorithm Using Predicate Encryption (2012) (0)
This paper list is powered by the following services: