Curriculum Vitae
June 24, 2007
Dr.Tatsuaki Okamoto
-Contents-
Biographical Data
1.1. Present Position
1.2. Education
1.3. Research Topics in NTT
Awards
Research Abroad
Guest speaker and Invitation
Teaching Experience
Professional Services
English Publications on Cryptography
1. Biographical Data
Personal
Born on September 22, 1952, in Ehime-ken, Japan.
Japanese.
Married.
1.1 Present Position
R&D Fellow
Okamoto Research Laboratory
Secure Platform Laboratories
Nippon Telegraph and Telephone Corporation (NTT)
3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan
1.2 Education
1976, March:
Bachelor Degree of Engineering (B.E.) in Applied Mathematics, from the University of Tokyo. Title of the B.E. thesis was "A Sequential Design Method of Linear Control System."
1978, March:
Master Degree of Engineering (M.E.) in Applied Mathematics, from the University of Tokyo. Title of the M.E. thesis was "A Differential Geometric Approach to a Class of Nonlinear Control Systems."
1988, April:
Ph.D. in Applied Mathematics from the University of Tokyo. Title of the Ph.D. thesis was "Encryption and Authentication Schemes Based on Public-Key Systems."
1.3. Research Topics in NTT
1978-1984
Network Architecture
1985-1987
Natural Language Processing
1984-1985, and 1987-Present
Cryptography
>> Return to Contents List
2. Awards
Best Achievement Award (Kobayashi memorial award) from IEICE (1993).
Research Achievement Awards of NTT (1992 and 1995).
Distinguished services of research award from Science and Technology Agency, Japan(1997)
Telecomm technology award from the Telecommunications Advancement Foundation, Japan (1998)
1999 NTT R&D Fellow
Technology award from Nikkei-BP Press (2000)
IEICE Fellow (2003)
>> Return to Contents List
3. Research Abroad
University of Waterloo, Waterloo, Canada, from September 1, 1989 till August 31,1990. Studied cryptography, especially number theoretic and elliptic curve algorithms (hosted by Prof. Scott A. Vanstone).
CWI, Amsterdam, Netherlands, from July 10 till 26, 1990. Studied cryptography,especially zero-knowledge proofs and some cryptographic protocols (hosted by Dr.David Chaum).
AT&T Bell Laboratories, Murray Hill, NJ, USA, from September 1, 1994 till August 31, 1995. Studied cryptography, especially zero-knowledge proofs and number theoretic algorithms (hosted by Dr. Andrew Odlyzko).
Newton Institute, Cambridge University, Cambridge, UK, from March 11 till April 21, 1996. Studied cryptographic protocols (hosted by Prof. Ross Anderson).
CRM, Bellaterra, Spain, from April 15 till June 30, 2005. Studied efficient multiparty protocols and paring-based cryptographic schemes (hosted by Prof. Jorge Viller with UPC, Barcelona, Spain).
ENS (Ecole Normale Superieure), Paris, France, from February 26 till March 24, 2007. Studied authenticated key exchange (hosted by Prof. Jacques Stern).
>> Return to Contents List
4. Guest speaker and Invitation
CWI (Netherlands) (1990.7)
IBM Watson Research Labs (USA) (1995.3)
Cambridge University (UK) (1996.3-4)
ETH (Switzerland) (1996.5)
Monash Univ. (Australia) (1996.8)
Electric Laboratories(Taiwan) (1998.5)
GJCC (Germany) (1998.10)
JWIS'98, Workshop on CCNT (Singapore) (1998.12)
PKC'99 (Japan) (1999.3)
Taipei University (Taiwan) (1999.5)
IEEE Information Theory Workshop (South Africa) (1999.7)
Luminy Workshop on Cryptography (France) (1999.10)
Workshop on Cryptographic Protocols (Switzerland) (2001.3)
Korea University, KISA, Seongkyunkwan University (Korea) (2001.6)
IEEE Computer Elements Workshop (USA) (2001.6)
ETH, EPFL (Switzerland) (2001.7)
IMS Workshop (Singapore) (2001.9)
WPMC'01 (Denmark) (2001.9)
ECC'01, Waterloo University (Canada) (2001.10)
WISA'02 (Korea) (2002.8)
Dagstuhl Workshop on Cryptography (Germany) (2002.9)
Daewoo Workshop on Cryptography (Korea) (2004.6)
Luminy Workshop on Cryptography (France) (2004.11)
EU Workshop on Provable Security (France) (2004.11)
CRM Workshop (Spain) (2005.4)
ENS (France) (2005.6)
Seoul National University (Korea) (2006.2)
AAECC2006 (USA) (2006.2)
VietCrypt2006 (Vietnam) (2006.9)
ISITA 2006 (Korea) (2006.10)
UCLA (USA) (2006.11)
Fields Institute (Canada) (2006.12)
ENS (France) (2007.3)
UCL (Belgium) (2007.3)
Bertinoro Workshop (Italy) (2007.3)
KIAS-KMS Workshop (Korea) (2007.6)
Dagstuhl Workshop on Cryptography (Germany) (2007.9)
>> Return to Contents List
5. Teaching Experience
1999-2004: Guest Professor, University of Tokyo (Grad. School of Mathematical Science)
2001-Present: Guest Professor, Kyoto University (Grad. School of Informatica)
2003-Present: Guest Professor, Tsukuba University (Grad. School of System and Info. Eng.)
2001-Present: Guest Lecturer, Chuo University (Grad. School of Mathematics) etc.
>> Return to Contents List
6. Professional Services
President of the Japan Society of Industrial and Applied Mathematics (JSIAM)(2007-2008)
Director of:
IACR (International Association of Cryptology Research: 1999-2001),
IEICE (the Institute of Electronics, Information and Communication Engineers, Japan: 2001-2003), and
JSIAM (1999-).
Chairperson of ISEC (the Information Security Research Group) of IEICE (1999-2000).
Steering Committee Member of:
ICICS (Co-Chair: 1997-2001),
PKC, and
TCC.
(Associate) Editor of:
AAECC (Applicable Algebra in Engineering, Communication and Computing) Journal,
JJIAM (Japan Journal of Industrial and Applied Mathematics), and
Journal of Cryptology.
Program (co-)Chair of:
ICICS'97 (International Conference on Information and Communications Security),
Asiacrypt'2000,
ICICS'01,
CT-RSA'04 (The Cryptographers' Track at the RSA Conference),
MAPTIC'05 (Workshop on Mathematical Problems and Techniques in Cryptography),
PKC'07 (The International Conference on Theory and Practice of Public-Key Cryptography),
Pairing'07 (International Conference on Pairing-based Cryptography),
CANS'07 (International Conference on Cryptology and Network Security).
Program Committees Member of:
Eurocrypt'92, Crypto'93, Eurocrypt'94, Asiacrypt'94, Eurocrypt'96. Crypto'97, PKC'98, PKC'99, PKC'01, Crypto'01, CT-RSA'02, PKC'02, Crypto'02, ICICS'02, PKC'03, CT-RSA'03, CCC'03, ICISC'03, FC'04, Crypto'04, Eurocrypt'05, ICALP'05, Mycrypt'05, CT-RSA'06, FC'06, ICALP'06. PQCrypto'06, SECRYPT'06, FC'07, ProvSec'07, Indocrypt'07, ACCS'08, TCC'08.
Member of several Committees of Japanese government including the CRYPTREC (Evaluation of Cryptographic Techniques) committee.
PhD Committee Member of
ETH (Switzerland) for Michael Stadler (supervised by Prof. Ueli Maurer)(1996.5)
ENST (France) for Pascal Paillier (supervised by Dr. David Naccache)(1999.9)
JAIST(Japan) for Takeshi Okamoto (supervised by Prof. Atsuko Miyaji)(2001.12)
UPC (Spain) for Javier Herranz (sepervised by Prof. German Saez)(2005.4)
Seoul National University (Korea) for Namsu Jho and Eunsun Yoo (supervised by Prof. Myung-Hwan Kim)(2007.6)
>> Return to Contents List
7. English Publications on Cryptography
Journal papers: [1]-[28]
International conference papers: [29]-[89]
e-print: [90]
"A Digital Signature Scheme Based on Polynomial Operations," with A. Shiraishi, Systems and Computers in Japan, 17, 5, pp.36-44 (1986) (translated from IECETransactions, J68-D, 5, pp.1157-1164 (1985)).
"A Fast Signature Scheme Based on Quadratic Inequalities," (with A. Shiraishi), Proceedings of the Symposium on Security and Privacy, pp.123-132 (1985).
"A Single Public-Key Authentication Scheme for Multiple Users," Systems and Computers in Japan, 18, 10, pp.14-24 (1987) (translated from IECE Transactions, J69-D,10, pp.1481-1489 (1986)).
"Fast Public-Key Cryptosystem Using Congruent Polynomial Equations," Electronics Letters, 22, 11, pp.581-582 (1986).
"Modification of a Public-Key Cryptosystem," Electronics Letters, 23, 16, pp.814-815 (1987).
"Practical Extension of the Fiat-Shamir Scheme," (with K. Ohta), Electronics Letters, 24, 15, pp.955-956 (1988).
"A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems," ACM Transactions on Computer Systems, Vol.6, No.8, pp.432-441 (1988).
"Membership Authentication for Hierarchical Multigroups Using a Mater Key,"(with K. Ohta), IEICE Transactions, Vol. E-73, No.7 (1990).
"A Fast Signature Scheme Based on Congruential Polynomial Operations, " IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47-53 (1990).
"Abuse of Undeniable Signatures and Their Countermeasures" (with K. Ohta and A. Fujioka), IEICE Transactions, Vol. E74, No.8, pp.2109-2113 (1991).
"Interactive Bi-proof Systems and Undeniable Signature Schemes" (with A. Fujioka and K. Ohta) IEICE Transactions, Vol. E-75-D, No. 1, pp. 102-109 (1992)
"Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
"Universal Electronic Cash," (with K. Ohta), IEICE Transaction, Vol. J76-D-I, No.6 (1993)
"On the Complexity of the Discrete Logarithm for a General Finite (with K. Sakurai and H. Shizuya), IEICE Transactions, Vol. E79-A , No. 1, pp. 61-65 (1996).
"One-Time Zero-Knowledge Authentication and Untraceable Cash," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
"Security of the Modified Fiat-Shamir Schemes," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
"Escraw Cash Systems," (with E. Fujisaki), IEICE Transactions, Vol. E81-A (1998), No. 1 (1998).
"Threshold Key-Recovery Systems for RSA," IEICE Transactions, Vol. E82-A, No. 1 (1999).
"Statistical Zero-Knowledge Protocols to Prove Modular] Polynomial Relations," (with E. Fujisaki), IEICE Transactions, Vol. E82-A, No. 1 (1999).
"Multi-Signature Schemes Secure against Active Insider Attacks,"(with K. Ohta), IEICE Transactions, Vol. E82-A, No. 1 (1999).
"On Relationships between Statistical Zero-Knowledge Proofs," Journal of Comput. and System Sciences, 60, pp.47-108 (1999).
"How to Enhance the Security of Public-Key Encryptions at Minimum Cost,"(with E. Fujisaki), IEICE Transactions, Vol. E83-A, No. 1, pp.147-165 (2000).
"A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No. 1 (2001).
"A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring" (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No.1, pp. 179-187(2001).
"A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No.1, pp. 197-204(2001).
"Delegation Chains Secure up to Constant Length," (with M. Abe), IEICE Transactions, Vol. E85-A, No.1, pp. 110-116(2002).
"RSA-OAEP Is Secure under the RSA Assumption", (with E. Fujisaki, D. Pointcheval, and J. Stern), Journal of Cryptology, Vol. 17 (2004).
"A Universally Composable Secure Channel Based on the KEM-DEM Framework," (with Waka Nagao and Yoshifumi Manabe) IEICE Transactions, Vol. E89-A, No.1, pp. 28-38 (2006).
"A Modification of the Fiat-Shamir Scheme," (with K. Ohta), the proceedings of Crypto'88, LNCS 403, Springer-Verlag, pp.232-243 (1990).
"Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility," (with K. Ohta), the proceedings of Eurocrypt'89, LNCS 434, Springer Verlag, pp.134-149 (1990).
"Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash," (with K. Ohta), the proceedings of Crypto'89, LNCS 435, Springer Verlag, pp.481-496 (1990).
"Membership Authentication for Hierarchical Multigroups Using the Extended FiatShamir Scheme," with (K. Ohta and K. Koyama), the proceedings of Eurocrypt'90, LNCS 473, Springer-Verlag, pp.446-457 (1991).
"How to Utilize the Randomness of Zero-Knowledge Proofs," (with K. Ohta), the proceedings of Crypto'90, LNCS 537, Springer-Verlag, pp.456-475 (1991).
"ESIGN: An Efficient Digital Signature Implementation for Smart Cards," (with A. Fujioka and S. Miyaguchi), the proceedings of Eurocrypt'91, LNCS 547, SpringerVerlag, pp.446-457 (1992).
"Interactive Bi-Proof Systems and Undeniable Signature Schemes," (with A. Fujioka and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.243-256 (1992).
"Direct Zero Knowedge Proofs of Computational Power in Five Rounds," (with D. Chaum and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.96-105 (1992).
"Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), the proceedings of STOC, pp.80-89 (1991), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
"Universal Electronic Cash," (with K. Ohta), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.324-337 (1992)
"Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems," (with K. Sakurai), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.267-278 (1992)
"New Public-Key Schemes Based on Elliptic Curves over the Ring Zn," (with K. Koyama, U.M. Maurer, and S.A. Vanstone), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.252-266 (1992)
"An Extension of Zero-Knowledge Proofs and Its Applications," to appear in the proceedings of Asiacrypt'91, LNCS 739, Springer-Verlag, pp.368-381 (1993).
"A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme," (with K. Ohta), to appear in the proceedings of Asiacrypt'91, LNCS 739, Springer-Verlag, pp.139-148 (1993).
"How Intractable Is the Discrete Logarithm for a General Finite Group," (with K. Sakurai and H. Shizuya), the proceedings of Eurocrypt'92, LNCS 658, SpringerVerlag, pp.420-428 (1993)
"Secure Bit Commitment Function against Divertibility," (with K. Ohta and A. Fujioka), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.324-340 (1993)
"An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Zn," (with A. Fujioka and E. Fujisaki), the proceedings of Crypto'92, LNCS 740, Springer-Verlag, pp.54-65 (1993)
"Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes," the proceedings of Crypto'92, LNCS 740, Springer-Verlag, pp.31-53 (1993)
"A Practical Secret Voting Scheme for Large Scale Elections", (with A. Fujioka and K. Ohta), the proceedings of Asiacrypt'92, LNCS 718, Springer-Verlag, pp.244-251 (1993).
"On Key Distribution and Authentication in Mobile Radio Networks," (with C. Park, K.Kurosawa, and S. Tsujii), the proceedings of Eurocrypt'93, LNCS 765, SpringerVerlag, pp.461-465 (1994).
"Survey of Digital Signature Schemes," (with K. Ohta), the proceedings of SPRC (the symposium on State and Progress of Research in Cryptography), Rome, pp.17-29 (1993)
"On the Relationship among Cryptographic Physical Assumptions," the Proceedings of ISAAC'93, LNCS 762, Springer-Verlag, pp.369-378 (1993).
"Simultaneous Secret Exchange Protocols Based on General Assumptions," (with K. Ohta), the Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp.184-192 (1994),
"Zero-Knowledge Proofs of Computational Power in the Shared String Model," (with A. De Santis and G. Persiano), the proceedings of Asiacrypt'94, LNCS 917, SpringerVerlag, pp.182-192 (1995).
"Single-Term Divisible Electronic Coins," (with T. Eng), the proceedings of Eurocrypt'94, LNCS 950, Springer-Verlag, pp.306-319 (1995).
"Designated Confirmer Signatures and Public-Key Encryption Are Equivalent," the proceedings of Crypto'94, LNCS 839, Springer-Verlag, pp. 61-74 (1995).
"Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs," (with I. Damgard, O. Goldreich and A. Wigderson), the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.325-338 (1995).
"An Efficient Divisible Electronic Cash Scheme," the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.438-451 (1995).
"On Relationships between Statistical Zero-Knowledge Proofs," the proceedings of STOC'96, pp.649-658 (1996).
"An Electronic Voting Scheme," the proceedings of IFIP'96, IT Tools Chapman & Hall, pp.21-30 (1996).
"Practical Escrow Cash Systems," (with E. Fujisaki), the proceedings of Security Protocols Workshop'96, LNCS 1189, Springer-Verlag, pp.33-48 (1997).
"Receipt-Free Electronic Voting Schemes for Large Scale Elections," the proceedings of Security Protocols Workshop'97, LNCS 1361, Springer-Verlag, pp.25-36 (1998).
"Threshold Key-Recovery Systems for RSA," the proceedings of Security Protocols Workshop'97, LNCS 1361, Springer-Verlag, pp.192-200 (1998).
"Statistical Zero-Knowledge Protocols to Prove Polynomial Relations," (with E. Fujisaki), the proceedings of Crypto'97, LNCS 1294, Springer-Verlag pp.16-30 (1997).
"Keeping the SZK-Verifier Honest Uncondi tionally," (with G. DiCrescenzo and M. Yung), the proceedings of Crypto'97, LNCS 1294, Springer-Verlag, pp.31-45 (1997).
"Lower Bounds on Term-Based Divisible Cash Systems," (with M. Yung), the proceedings of PKC'98, LNCS 1431, Springer-Verlag, pp.72-82 (1998).
"NTT's Public-Key Cryptosystem and Electronic Money System," (with H.Kawahara and K.Koyama), the proceedings of PKS'98, Certicom (1998)
"Security of an Identity-Based Cryptosystem and the Related Reductions," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.546-560 (1998).
"A Practical and Provably Secure Scheme for Publicly Secret Sharing and Its Application," (with E. Fujisaki), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.32-46 (1998).
"A Public-Key Cryptosystem as Secure as Factoring," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.308-318 (1998).
"The Concrete Security Treatment of Signature Schemes Derived from Identification," (with K. Ohta), the proceedings of Crypto'98, LNCS 1462, Springer-Verlag,pp.354-369 (1998).
"EPOC: Efficient Probabilistic Public-Key Encryption," (with S.Uchiyama and E.Fujisaki), IEEE P1363, (1998).
"TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash," (with E.Fujisaki and H.Morita), IEEE P1363a, (1998).
"Provable Security of Practical Public-Key Encryption Scheme," the proceedings of JWIS98, (1998)
"Oblivious Transfer Channels and Dealing Channels," , DMTCS'99, (1999).
"How to Enhance the Security of Public-Key Encryptions at Minimum Cost," (with E. Fujisaki), the proceedings of PKC'99, LNCS 1560, Springer-Verlag, pp.53-68 (1999).
"Secure Integration of Asymmetric and Symmetric Encryption Schemes," (with E. Fujisaki), the proceedings of Crypto'99, LNCS 1666, Springer-Verlag, pp.537-554 (1999).
"A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), the proceedings of Asiarypto'99, LNCS 1716, Springer-Verlag, pp.378-389 (1999).
"Quantum Public-Key Cryptosystems", (with K.Tanaka and S.Uchiyama), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
"Provably Secure Partially Blind Signatures", (with M.Abe), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
"The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes", (with D. Pointcheval), the proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp.104-118 (2001).
"REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform", (with D. Pointcheval), the proceedings of Cryptographers' Track at RSA Conference'01 (CT-RSA'01), LNCS 2020, Springer-Verlag, pp.159-175 (2001).
"RSA-OAEP is Secure under the RSA Assumption" (with E. Fujisaki, D. Pointcheval and J. Stern), the proceedings of Crypto'01, LNCS 2139, Springer-Verlag, pp.260-274 (2001)
"A New Approach to Knapsack Cryptosystems (Extended Abstract)," (with K. Tanaka), the proceedings of WISA2002, Vol.3, pp.33-42(2002).
"Almost Uniform Density of Power Residues and the Provable Security of ESIGN", (with J. Stern), the proceedings of Asiacrypt 2003, LNCS 2894, Springer, pp.287-301 (2003).
"An RSA Family of Trap-door Permutations with a Common Domain and Its Application", (with R. Hayashi and K. Tanaka), the proceedings of PKC'04, LNCS 2947, Springer-Verlag, pp.291-304 (2004)
"A Universal Composable Channel Based on the KEM-DEM Framework", (with W. Nagao and Y. Manabe) the proceedings of TCC'05, LNCS 3378, Springer-Verlag, pp.426-444 (2005).
"Efficient Blind and Partially Blind Signatures Without Random Oracles", the proceedings of TCC'06, LNCS 3876, Springer-Verlag, pp.80-99 (2006).
"Cryptography Based on Bilinear Maps", the proceedings of AAECC-16, LNCS 3857, Springer-Verlag, pp.35-50 (2006).
"On Pairing-Based Cryptosystems", the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.50-66 (2006).
"Universally Composable Identity-Based Encryption", (with R. Nishimaki and Y. Manabe) the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.337-353 (2006).
"Resource Bounded Unprovability of Computational Lower BoundsE ePrint Archive 2003/187, IACR,
http://eprint.iacr.org/
(2003)
>> Return to Contents List
Close This Window