Curriculum Vitae

June 24, 2007

Dr.Tatsuaki Okamoto

-Contents-

  1. Biographical Data
  2. Awards
  3. Research Abroad
  4. Guest speaker and Invitation
  5. Teaching Experience
  6. Professional Services
  7. English Publications on Cryptography

1. Biographical Data

Personal
1.1 Present Position
1.2 Education
1976, March:
Bachelor Degree of Engineering (B.E.) in Applied Mathematics, from the University of Tokyo. Title of the B.E. thesis was "A Sequential Design Method of Linear Control System."
1978, March:
Master Degree of Engineering (M.E.) in Applied Mathematics, from the University of Tokyo. Title of the M.E. thesis was "A Differential Geometric Approach to a Class of Nonlinear Control Systems."
1988, April:
Ph.D. in Applied Mathematics from the University of Tokyo. Title of the Ph.D. thesis was "Encryption and Authentication Schemes Based on Public-Key Systems."
1.3. Research Topics in NTT

>> Return to Contents List

2. Awards

>> Return to Contents List

3. Research Abroad

>> Return to Contents List

4. Guest speaker and Invitation

>> Return to Contents List

5. Teaching Experience

>> Return to Contents List

6. Professional Services

>> Return to Contents List

7. English Publications on Cryptography

  1. "A Digital Signature Scheme Based on Polynomial Operations," with A. Shiraishi, Systems and Computers in Japan, 17, 5, pp.36-44 (1986) (translated from IECETransactions, J68-D, 5, pp.1157-1164 (1985)).
  2. "A Fast Signature Scheme Based on Quadratic Inequalities," (with A. Shiraishi), Proceedings of the Symposium on Security and Privacy, pp.123-132 (1985).
  3. "A Single Public-Key Authentication Scheme for Multiple Users," Systems and Computers in Japan, 18, 10, pp.14-24 (1987) (translated from IECE Transactions, J69-D,10, pp.1481-1489 (1986)).
  4. "Fast Public-Key Cryptosystem Using Congruent Polynomial Equations," Electronics Letters, 22, 11, pp.581-582 (1986).
  5. "Modification of a Public-Key Cryptosystem," Electronics Letters, 23, 16, pp.814-815 (1987).
  6. "Practical Extension of the Fiat-Shamir Scheme," (with K. Ohta), Electronics Letters, 24, 15, pp.955-956 (1988).
  7. "A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems," ACM Transactions on Computer Systems, Vol.6, No.8, pp.432-441 (1988).
  8. "Membership Authentication for Hierarchical Multigroups Using a Mater Key,"(with K. Ohta), IEICE Transactions, Vol. E-73, No.7 (1990).
  9. "A Fast Signature Scheme Based on Congruential Polynomial Operations, " IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47-53 (1990).
  10. "Abuse of Undeniable Signatures and Their Countermeasures" (with K. Ohta and A. Fujioka), IEICE Transactions, Vol. E74, No.8, pp.2109-2113 (1991).
  11. "Interactive Bi-proof Systems and Undeniable Signature Schemes" (with A. Fujioka and K. Ohta) IEICE Transactions, Vol. E-75-D, No. 1, pp. 102-109 (1992)
  12. "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
  13. "Universal Electronic Cash," (with K. Ohta), IEICE Transaction, Vol. J76-D-I, No.6 (1993)
  14. "On the Complexity of the Discrete Logarithm for a General Finite (with K. Sakurai and H. Shizuya), IEICE Transactions, Vol. E79-A , No. 1, pp. 61-65 (1996).
  15. "One-Time Zero-Knowledge Authentication and Untraceable Cash," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
  16. "Security of the Modified Fiat-Shamir Schemes," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
  17. "Escraw Cash Systems," (with E. Fujisaki), IEICE Transactions, Vol. E81-A (1998), No. 1 (1998).
  18. "Threshold Key-Recovery Systems for RSA," IEICE Transactions, Vol. E82-A, No. 1 (1999).
  19. "Statistical Zero-Knowledge Protocols to Prove Modular] Polynomial Relations," (with E. Fujisaki), IEICE Transactions, Vol. E82-A, No. 1 (1999).
  20. "Multi-Signature Schemes Secure against Active Insider Attacks,"(with K. Ohta), IEICE Transactions, Vol. E82-A, No. 1 (1999).
  21. "On Relationships between Statistical Zero-Knowledge Proofs," Journal of Comput. and System Sciences, 60, pp.47-108 (1999).
  22. "How to Enhance the Security of Public-Key Encryptions at Minimum Cost,"(with E. Fujisaki), IEICE Transactions, Vol. E83-A, No. 1, pp.147-165 (2000).
  23. "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No. 1 (2001).
  24. "A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring" (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No.1, pp. 179-187(2001).
  25. "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No.1, pp. 197-204(2001).
  26. "Delegation Chains Secure up to Constant Length," (with M. Abe), IEICE Transactions, Vol. E85-A, No.1, pp. 110-116(2002).
  27. "RSA-OAEP Is Secure under the RSA Assumption", (with E. Fujisaki, D. Pointcheval, and J. Stern), Journal of Cryptology, Vol. 17 (2004).
  28. "A Universally Composable Secure Channel Based on the KEM-DEM Framework," (with Waka Nagao and Yoshifumi Manabe) IEICE Transactions, Vol. E89-A, No.1, pp. 28-38 (2006).
  29. "A Modification of the Fiat-Shamir Scheme," (with K. Ohta), the proceedings of Crypto'88, LNCS 403, Springer-Verlag, pp.232-243 (1990).
  30. "Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility," (with K. Ohta), the proceedings of Eurocrypt'89, LNCS 434, Springer Verlag, pp.134-149 (1990).
  31. "Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash," (with K. Ohta), the proceedings of Crypto'89, LNCS 435, Springer Verlag, pp.481-496 (1990).
  32. "Membership Authentication for Hierarchical Multigroups Using the Extended FiatShamir Scheme," with (K. Ohta and K. Koyama), the proceedings of Eurocrypt'90, LNCS 473, Springer-Verlag, pp.446-457 (1991).
  33. "How to Utilize the Randomness of Zero-Knowledge Proofs," (with K. Ohta), the proceedings of Crypto'90, LNCS 537, Springer-Verlag, pp.456-475 (1991).
  34. "ESIGN: An Efficient Digital Signature Implementation for Smart Cards," (with A. Fujioka and S. Miyaguchi), the proceedings of Eurocrypt'91, LNCS 547, SpringerVerlag, pp.446-457 (1992).
  35. "Interactive Bi-Proof Systems and Undeniable Signature Schemes," (with A. Fujioka and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.243-256 (1992).
  36. "Direct Zero Knowedge Proofs of Computational Power in Five Rounds," (with D. Chaum and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.96-105 (1992).
  37. "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), the proceedings of STOC, pp.80-89 (1991), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
  38. "Universal Electronic Cash," (with K. Ohta), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.324-337 (1992)
  39. "Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems," (with K. Sakurai), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.267-278 (1992)
  40. "New Public-Key Schemes Based on Elliptic Curves over the Ring Zn," (with K. Koyama, U.M. Maurer, and S.A. Vanstone), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.252-266 (1992)
  41. "An Extension of Zero-Knowledge Proofs and Its Applications," to appear in the proceedings of Asiacrypt'91, LNCS 739, Springer-Verlag, pp.368-381 (1993).
  42. "A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme," (with K. Ohta), to appear in the proceedings of Asiacrypt'91, LNCS 739, Springer-Verlag, pp.139-148 (1993).
  43. "How Intractable Is the Discrete Logarithm for a General Finite Group," (with K. Sakurai and H. Shizuya), the proceedings of Eurocrypt'92, LNCS 658, SpringerVerlag, pp.420-428 (1993)
  44. "Secure Bit Commitment Function against Divertibility," (with K. Ohta and A. Fujioka), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.324-340 (1993)
  45. "An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Zn," (with A. Fujioka and E. Fujisaki), the proceedings of Crypto'92, LNCS 740, Springer-Verlag, pp.54-65 (1993)
  46. "Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes," the proceedings of Crypto'92, LNCS 740, Springer-Verlag, pp.31-53 (1993)
  47. "A Practical Secret Voting Scheme for Large Scale Elections", (with A. Fujioka and K. Ohta), the proceedings of Asiacrypt'92, LNCS 718, Springer-Verlag, pp.244-251 (1993).
  48. "On Key Distribution and Authentication in Mobile Radio Networks," (with C. Park, K.Kurosawa, and S. Tsujii), the proceedings of Eurocrypt'93, LNCS 765, SpringerVerlag, pp.461-465 (1994).
  49. "Survey of Digital Signature Schemes," (with K. Ohta), the proceedings of SPRC (the symposium on State and Progress of Research in Cryptography), Rome, pp.17-29 (1993)
  50. "On the Relationship among Cryptographic Physical Assumptions," the Proceedings of ISAAC'93, LNCS 762, Springer-Verlag, pp.369-378 (1993).
  51. "Simultaneous Secret Exchange Protocols Based on General Assumptions," (with K. Ohta), the Proceedings of the ACM Conference on Computer and Communications Security, ACM, pp.184-192 (1994),
  52. "Zero-Knowledge Proofs of Computational Power in the Shared String Model," (with A. De Santis and G. Persiano), the proceedings of Asiacrypt'94, LNCS 917, SpringerVerlag, pp.182-192 (1995).
  53. "Single-Term Divisible Electronic Coins," (with T. Eng), the proceedings of Eurocrypt'94, LNCS 950, Springer-Verlag, pp.306-319 (1995).
  54. "Designated Confirmer Signatures and Public-Key Encryption Are Equivalent," the proceedings of Crypto'94, LNCS 839, Springer-Verlag, pp. 61-74 (1995).
  55. "Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs," (with I. Damgard, O. Goldreich and A. Wigderson), the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.325-338 (1995).
  56. "An Efficient Divisible Electronic Cash Scheme," the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.438-451 (1995).
  57. "On Relationships between Statistical Zero-Knowledge Proofs," the proceedings of STOC'96, pp.649-658 (1996).
  58. "An Electronic Voting Scheme," the proceedings of IFIP'96, IT Tools Chapman & Hall, pp.21-30 (1996).
  59. "Practical Escrow Cash Systems," (with E. Fujisaki), the proceedings of Security Protocols Workshop'96, LNCS 1189, Springer-Verlag, pp.33-48 (1997).
  60. "Receipt-Free Electronic Voting Schemes for Large Scale Elections," the proceedings of Security Protocols Workshop'97, LNCS 1361, Springer-Verlag, pp.25-36 (1998).
  61. "Threshold Key-Recovery Systems for RSA," the proceedings of Security Protocols Workshop'97, LNCS 1361, Springer-Verlag, pp.192-200 (1998).
  62. "Statistical Zero-Knowledge Protocols to Prove Polynomial Relations," (with E. Fujisaki), the proceedings of Crypto'97, LNCS 1294, Springer-Verlag pp.16-30 (1997).
  63. "Keeping the SZK-Verifier Honest Uncondi tionally," (with G. DiCrescenzo and M. Yung), the proceedings of Crypto'97, LNCS 1294, Springer-Verlag, pp.31-45 (1997).
  64. "Lower Bounds on Term-Based Divisible Cash Systems," (with M. Yung), the proceedings of PKC'98, LNCS 1431, Springer-Verlag, pp.72-82 (1998).
  65. "NTT's Public-Key Cryptosystem and Electronic Money System," (with H.Kawahara and K.Koyama), the proceedings of PKS'98, Certicom (1998)
  66. "Security of an Identity-Based Cryptosystem and the Related Reductions," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.546-560 (1998).
  67. "A Practical and Provably Secure Scheme for Publicly Secret Sharing and Its Application," (with E. Fujisaki), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.32-46 (1998).
  68. "A Public-Key Cryptosystem as Secure as Factoring," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp.308-318 (1998).
  69. "The Concrete Security Treatment of Signature Schemes Derived from Identification," (with K. Ohta), the proceedings of Crypto'98, LNCS 1462, Springer-Verlag,pp.354-369 (1998).
  70. "EPOC: Efficient Probabilistic Public-Key Encryption," (with S.Uchiyama and E.Fujisaki), IEEE P1363, (1998).
  71. "TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash," (with E.Fujisaki and H.Morita), IEEE P1363a, (1998).
  72. "Provable Security of Practical Public-Key Encryption Scheme," the proceedings of JWIS98, (1998)
  73. "Oblivious Transfer Channels and Dealing Channels," , DMTCS'99, (1999).
  74. "How to Enhance the Security of Public-Key Encryptions at Minimum Cost," (with E. Fujisaki), the proceedings of PKC'99, LNCS 1560, Springer-Verlag, pp.53-68 (1999).
  75. "Secure Integration of Asymmetric and Symmetric Encryption Schemes," (with E. Fujisaki), the proceedings of Crypto'99, LNCS 1666, Springer-Verlag, pp.537-554 (1999).
  76. "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), the proceedings of Asiarypto'99, LNCS 1716, Springer-Verlag, pp.378-389 (1999).
  77. "Quantum Public-Key Cryptosystems", (with K.Tanaka and S.Uchiyama), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
  78. "Provably Secure Partially Blind Signatures", (with M.Abe), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
  79. "The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes", (with D. Pointcheval), the proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp.104-118 (2001).
  80. "REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform", (with D. Pointcheval), the proceedings of Cryptographers' Track at RSA Conference'01 (CT-RSA'01), LNCS 2020, Springer-Verlag, pp.159-175 (2001).
  81. "RSA-OAEP is Secure under the RSA Assumption" (with E. Fujisaki, D. Pointcheval and J. Stern), the proceedings of Crypto'01, LNCS 2139, Springer-Verlag, pp.260-274 (2001)
  82. "A New Approach to Knapsack Cryptosystems (Extended Abstract)," (with K. Tanaka), the proceedings of WISA2002, Vol.3, pp.33-42(2002).
  83. "Almost Uniform Density of Power Residues and the Provable Security of ESIGN", (with J. Stern), the proceedings of Asiacrypt 2003, LNCS 2894, Springer, pp.287-301 (2003).
  84. "An RSA Family of Trap-door Permutations with a Common Domain and Its Application", (with R. Hayashi and K. Tanaka), the proceedings of PKC'04, LNCS 2947, Springer-Verlag, pp.291-304 (2004)
  85. "A Universal Composable Channel Based on the KEM-DEM Framework", (with W. Nagao and Y. Manabe) the proceedings of TCC'05, LNCS 3378, Springer-Verlag, pp.426-444 (2005).
  86. "Efficient Blind and Partially Blind Signatures Without Random Oracles", the proceedings of TCC'06, LNCS 3876, Springer-Verlag, pp.80-99 (2006).
  87. "Cryptography Based on Bilinear Maps", the proceedings of AAECC-16, LNCS 3857, Springer-Verlag, pp.35-50 (2006).
  88. "On Pairing-Based Cryptosystems", the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.50-66 (2006).
  89. "Universally Composable Identity-Based Encryption", (with R. Nishimaki and Y. Manabe) the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.337-353 (2006).
  90. "Resource Bounded Unprovability of Computational Lower BoundsE ePrint Archive 2003/187, IACR, http://eprint.iacr.org/ (2003)

>> Return to Contents List

Close This Window