August 5, 2015

- Born on September 22, 1952, in Ehime-ken, Japan.

- NTT Fellow
- Okamoto Research Laboratory
- Secure Platform Laboratories
- Nippon Telegraph and Telephone Corporation (NTT)
- 3-9-11 Midori-cho, Musashino-shi, Tokyo, 180-8585 Japan

Bachelor Degree of Engineering (B.E.) in Applied Mathematics, from the University of Tokyo. Title of the B.E. thesis was "A Sequential Design Method of Linear Control System."

Master Degree of Engineering (M.E.) in Applied Mathematics, from the University of Tokyo. Title of the M.E. thesis was "A Differential Geometric Approach to a Class of Nonlinear Control Systems."

Ph.D. in Applied Mathematics from the University of Tokyo. Title of the Ph.D. thesis was "Encryption and Authentication Schemes Based on Public-Key Systems."

- IEICE Best Achievement Award (Kobayashi memorial award) (1993)
- Research Achievement Awards of NTT (1992 and 1995)
- Distinguished services of research award from Science and Technology Agency, Japan (1997)
- Telecomm technology award from the Telecommunications Advancement Foundation, Japan (1998)
- NTT R&D Fellow (1999)
- Technology award from Nikkei-BP Press (2000)
- IEICE Fellow (2003)
- Certicom ECC Technology Award (2007)
- METI Award (2008)
- IACR Distinguished Lecturer (2009)
- IISEC Information Security Cultural Award (2009)
- IEICE Distinguished Achievement and Contributions Award (2011)
- JSIAM Fellow (2011)
- Medal with Purple Ribbon (2012)
- IACR Fellow (2015)

- 1999-2004: Guest Professor, University of Tokyo (Grad. School of Mathematical Science)
- 2001-Present: Guest Professor, Kyoto University (Grad. School of Informatica)
- 2003-2010: Guest Professor, Tsukuba University (Grad. School of System and Info. Eng.)
- 2001-Present: Guest Lecturer, Chuo University (Grad. School of Mathematics)
- 2011: Guest Lecturer, University of Electro-Communications (Grad. School of Mathematics)

- President of the Japan Society of Industrial and Applied Mathematics (JSIAM) (2007--2008)
- Director of IACR (International Association of Cryptology Research: 1999--2001)
- Director of IEICE (the Institute of Electronics, Information and Communication Engineers, Japan: 2001--2003)
- Director of JSIAM (1999--2007)
- Chairperson of ISEC (the Information Security Research Group) of IEICE (1999--2000)

- Steering Committee Member of PKC, TCC and Pairing Conference.
- (Associate) Editor of Journal of Cryptology.
- Program (co-)Chair of ICICS'97, ASIACRYPT'2000, ICICS'01, CT-RSA'04, MAPTIC'05, PKC'07, Pairing'07, and CANS'07.
- General (co-)Chair of TCC'13, and ProvSec15.
- Program Committees Member of Eurocrypt'92, Crypto'93, Eurocrypt'94, ASIACRYPT'94, Eurocrypt'96, Crypto'97, PKC'98, PKC'99, PKC'01, Crypto'01, CT-RSA'02, PKC'02, Crypto'02, ICICS'02, PKC'03, CT-RSA'03, CCC'03, ICISC'03, FC'04, Crypto'04, Eurocrypt'05, ICALP'05, Mycrypt'05, CT-RSA'06, FC'06, ICALP'06. PQCrypto'06, SECRYPT'06, FC'07, ProvSec'07, Indocrypt'07, ACCS'08, TCC'08, SCN'08, ASIACRYPT'08, SAC'08, ProvSec'08, ICISC'08, CANS'08, IWSEC'08, Eurocrypt'09, CosyProofs'09, Pairing'09, ProvSec'09, Eurocrypt'10, ACNS' 10, ProvSec'10, CT-RSA' 11, Eurocrypt'11, CT-RSA' 12, Crypto12, ASIACRYPT'12, PKC13, ProvSec13, ACISP14, FC14, ASIACRYPT'15.
- Member of several Committees of Japanese government including the CRYPTREC (Evaluation of Cryptographic Techniques) committee.

- ETH (Switzerland) for Michael Stadler (supervised by Prof. Ueli Maurer) (1996.5)
- ENST (France) for Pascal Paillier (supervised by Dr. David Naccache)(1999.9)
- JAIST(Japan) for Takeshi Okamoto (supervised by Prof. Atsuko Miyaji) (2001.12)
- UPC (Spain) for Javier Herranz (supervised by Prof. German Saez) (2005.4)
- Seoul National University (Korea) for Namsu Jho and Eunsun Yoo (supervised by Prof. Myung-Hwan Kim) (2007.6)
- Kyoto University (Japan) for Mitsuo Okada (supervised by Prof. Toshio Okabe) (2011.6)
- ENS (France) for Mehdi Tibouch (supervised by Dr. David Naccache)(2011.9)
- Seoul National University (Korea) for Hyung Tae Lee (supervised by Prof. Jung Hee Cheon) (2012.11)

- A Digital Signature Scheme Based on Polynomial Operations, (with A. Shiraishi), Systems and Computers in Japan, 17, 5, pp.36-44 (1986) translated from IECE Transactions, J68-D, 5, pp.1157-1164 (1985).
- A Single Public-Key Authentication Scheme for Multiple Users, Systems and Computers in Japan, 18, 10, pp.14-24 (1987) translated from IECE Transactions, J69-D, 10, pp.1481-1489 (1986).
- Fast Public-Key Cryptosystem Using Congruent Polynomial Equations, Electronics Letters, 22, 11, pp.581-582 (1986).
- Modification of a Public-Key Cryptosystem, Electronics Letters, 23, 16, pp.814-815 (1987).
- Practical Extension of the Fiat-Shamir Scheme, (with K. Ohta), Electronics Letters, 24, 15, pp.955-956 (1988).
- A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems, ACM Transactions on Computer Systems, Vol.6, No.8, pp.432-441 (1988).
- Membership Authentication for Hierarchical Multigroups Using a Mater Key, (with K. Ohta), IEICE Transactions, Vol. E-73, No.7, pp.1107-1110 (1990).
- A Fast Signature Scheme Based on Congruential Polynomial Operations, IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47-53 (1990).
- Abuse of Undeniable Signatures and Their Countermeasures, (with K. Ohta and A. Fujioka), IEICE Transactions, Vol. E74, No.8, pp.2109-2113 (1991).
- Interactive Bi-proof Systems and Undeniable Signature Schemes, (with A. Fujioka and K. Ohta) IEICE Transactions, Vol. E-75-D, No. 1, pp. 102-109 (1992)
- Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field, (with A. Menezes and S. Vanstone), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
- On the Complexity of the Discrete Logarithm for a General Finite, (with K. Sakurai and H. Shizuya), IEICE Transactions, Vol. E79-A , No. 1, pp. 61-65 (1996).
- One-Time Zero-Knowledge Authentication and Untraceable Cash, (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
- Security of the Modified Fiat-Shamir Schemes, (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
- Escraw Cash Systems, (with E. Fujisaki), IEICE Transactions, Vol. E81-A (1998), No. 1 (1998).
- Threshold Key-Recovery Systems for RSA, IEICE Transactions, Vol. E82-A, No. 1 (1999).
- Statistical Zero-Knowledge Protocols to Prove Modular] Polynomial Relations, (with E. Fujisaki), IEICE Transactions, Vol. E82-A, No. 1 (1999).
- Multi-Signature Schemes Secure against Active Insider Attacks, (with K. Ohta), IEICE Transactions, Vol. E82-A, No. 1 (1999).
- On Relationships between Statistical Zero-Knowledge Proofs, Journal of Comput. and System Sciences, 60, pp.47-108 (1999).
- How to Enhance the Security of Public-Key Encryptions at Minimum Cost, (with E. Fujisaki), IEICE Transactions, Vol. E83-A, No. 1, pp.147-165 (2000).
- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), IEICE Transactions, Vol. E84-A, No. 1 (2001).
- A Chosen-Cipher Secure Encryption Scheme Tightly As Secure As Factoring, (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No. 1 (2001).
- How to Enhance the Security of Public-Key Encryption at Minimum Cost, (with E. Fujisaki), IEICE Transactions, Vol. E83-A, No.1, pp. 24-32(2000).
- A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring, (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No.1, pp. 179-187(2001).
- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), IEICE Transactions, Vol. E84-A, No.1, pp. 197-204(2001).
- Delegation Chains Secure up to Constant Length, (with M. Abe), IEICE Transactions, Vol. E85-A, No.1, pp. 110-116(2002).
- RSA-OAEP Is Secure under the RSA Assumption, (with E. Fujisaki, D. Pointcheval, and J. Stern), Journal of Cryptology, Vol. 17 (2004).
- A Universally Composable Secure Channel Based on the KEM-DEM Framework, (with W. Nagao and Y. Manabe), IEICE Transactions, Vol. E89-A, No.1, pp. 28-38 (2006).
- An optimistic fair exchange protocol and its security in the universal composability framework, (with Y. Okada and Y. Manabe), IJACT Transactions, Vol. 1, No. 1, pp. 70-77, (2008).
- On the Equivalence of Several Security Notions of KEM and DEM, (with W. Nagao and Y. Manabe), IEICE Transactions, Vol. E91-A, No.1, pp. 283-297, (2008).
- Universally Composable Identity-Based Encryption, (with R. Nishimaki and Y. Manabe), IEICE Transactions, Vol. E91-A, No.1, pp. 262-271, (2008).
- Chosen Ciphertext Security with Optimal Ciphertext Overhead, (with M. Abe and E. Kiltz), IEICE Transactions, Vol. E93-A, No.1, pp. 22-33, (2010).
- An eCK-secure Authenticated Key Exchange Protocol without Random Oracles, (with D. Moriyama), KSII Transactions, Vol. 5, No.3, pp. 607-625, (2011).
- Meta-envy-free Cake-cutting and Pie-cutting Protocols, (with Y. Manabe), JIP Transactions, Vol. 20, No.3, pp. 686-693, (2012).
- Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption, (with K. Takashima), IEICE Transactions, Vol. E96-A, No.1, pp. 42-52 (2013).
- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption, (with T. Mitsunaga and Y. Manabe), IEICE Transactions, Vol. E96-A, No.1, pp. 68-75, (2013).
- Message Recovery Signature Schemes from Sigma-Protocols, (with M. Abe and K. Suzuki), IEICE Transactions, Vol. E96-A, No.1, 92-100, (2013).
- Secure Integration of Asymmetric and Symmetric Encryption Schemes, (with E. Fujisaki), J. Cryptology Vol. 26, No.1, pp. 80-101, (2013).
- Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model, (with K. Takashima), IEEE Transactions on Cloud Computing, Vol.2, No.4, pp. 409-421, (2014).
- Dual Pairing Vector Spaces and Their Applications, (with K. Takashima), IEICE Transactions,Vol.98, No.A(1), pp. 3-15, (2015).
- A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus, (with Y. Manabe and R. Otsuka), Journal of Information Processing, Vol.23, pp. 299-304, (2015).

- Modification of the Fiat-Shamir Scheme, (with K. Ohta), the proceedings of Crypto'88, LNCS 403, Springer-Verlag, pp.232-243 (1990).
- Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility, (with K. Ohta), the proceedings of Eurocrypt'89, LNCS, Springer-Verlag, pp.134-149 (1990).
- Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, (with K. Ohta), the proceedings of Crypto'89, LNCS, Springer-Verlag, pp.481-496 (1990).
- Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, (with K. Ohta and K. Koyama), the proceedings of Eurocrypt'90, LNCS 473, Springer-Verlag, pp.446-457 (1991).
- How to Utilize the Randomness of Zero-Knowledge Proofs, (with K. Ohta), the proceedings of Crypto'90, LNCS 537, Springer-Verlag, pp.456-475 (1991).
- ESIGN: An Efficient Digital Signature Implementation for Smart Cards, (with A. Fujioka and S. Miyaguchi), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.446-457 (1992).
- Interactive Bi-Proof Systems and Undeniable Signature Schemes, with A. Fujioka and K. Ohta, the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.243-256 (1992).
- Direct Zero Knowledge Proofs of Computational Power in Five Rounds, (with D. Chaum and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.96-105 (1992).
- Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field, (with A. Menezes and S. Vanstone), the proceedings of STOC, pp.80-89 (1991).
- Universal Electronic Cash, (with K. Ohta), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.324-337 (1992).
- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems, (with K. Sakurai), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.267-278 (1992)
- New Public-Key Schemes Based on Elliptic Curves over the Ring Z_n, (with K. Koyama, U.M. Maurer, and S.A. Vanstone), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.252-266 (1992)
- An Extension of Zero-Knowledge Proofs and Its Applications, the proceedings of ASIACRYPT'91, LNCS 739, Springer-Verlag, pp. 368-381(1992).
- A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, (with K. Ohta), the proceedings of ASIACRYPT'91, LNCS 739, Springer-Verlag, pp. 139-148 (1992).
- How Intractable Is the Discrete Logarithm for a General Finite Group, (with K. Sakurai and H. Shizuya), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.420-428 (1993).
- Secure Bit Commitment Function against Divertibility, (with K. Ohta and A. Fujioka), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.324-340 (1993).
- An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Z_n, (with A. Fujioka and E. Fujisaki), the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.54-65 (1993)
- Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.31-53 (1993)
- A Practical Secret Voting Scheme for Large Scale Elections, (with A. Fujioka and K. Ohta), the proceedings of Auscrypt'92, LNCS, Springer--Verlag (1993).
- On Key Distribution and Authentication in Mobile Radio Networks, (with C. Park, K.Kurosawa, and S. Tsujii), the proceedings of Eurocrypt'93, LNCS, Springer-Verlag (1994).
- Survey of Digital Signature Schemes, (with K. Ohta),the proceedings of SPRC (the symposium on State and Progress of Research in Cryptography), Rome, pp.17-29 (1993)
- On the Relationship among Cryptographic Physical Assumptions, the Proceedings of ISAAC'93, LNCS 762, Springer-Verlag, pp. 369-378 (1993).
- Designated Confirmer Signatures and Public-Key Encryption Are Equivalent, the proceedings of Crypto'94, LNCS 839, Springer-Verlag, pp. 61-74 (1995).
- Simultaneous Secret Exchange Protocols Based on General Assumptions, (with K. Ohta), the Proceedings of the ACM Conference on Computer and Communications Security (1994).
- Zero-Knowledge Proofs of Computational Power in the Shared String Model, (with A. De Santis and G. Persiano), the proceedings of ASIACRYPT'94, LNCS, Springer-Verlag (1995).
- Single-Term Divisible Electronic Coins, (with T. Eng), the proceedings of Eurocrypt'94, LNCS 950, Springer-Verlag, pp.306-319 (1995).
- Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs, (with I. Damgaard, O. Goldreich and A. Wigderson), the proceedings of Crypto'95}, LNCS 963, Springer--Verlag, pp.325--338 (1995).
- An Efficient Divisible Electronic Cash Scheme, the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.438-451 (1995).
- Practical Escrow Cash Systems, (with E. Fujisaki), the proceedings of Security Protocols Workshop, LNCS 1189, Springer-Verlag, pp. 33-48 (1996).
- On Relationships between Statistical Zero-Knowledge Proofs, the proceedings of STOC, pp.649-658 (1996).
- An Electronic Voting Scheme, the proceedings of IFIP'96, IT Tools (1996).
- Receipt-Free Electronic Voting Schemes for Large Scale Elections, the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.25-36 (1997).
- Threshold Key-Recovery Systems for RSA, the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.192-200 (1997).
- Statistical Zero-Knowledge Protocols to Prove Polynomial Relations, (with E. Fujisaki), the proceedings of Crypto'97, LNCS1294, Springer-Verlag, pp16-30 (1997).
- Keeping the SZK-Verifier Honest Uncondi tionally, (with G. DiCrescenzo and M. Yung), the proceedings of Crypto'97, LNCS 1294, pp31-45 Springer-Verlag (1997).
- Lower Bounds on Term-Based Divisible Cash Systems, (with M. Yung), the proceedings of PKC'98, LNCS 1431, Springer-Verlag, pp72-82 (1998).
- NTT's Public-Key Cryptosystem and Electronic Money System, (with H.Kawahara and K.Koyama), the proceedings of PKS'98, Certicom (1998)
- Security of an Identity-Based Cryptosystem and the Related Reductions, (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp546-560 (1998).
- A Practical and Provably Secure Scheme for Publicly Secret Sharing and Its Application, (with E. Fujisaki), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp32-46 (1998).
- A Public-Key Cryptosystem as Secure as Factoring, (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp308-318 (1998).
- On Concrete Security Treatment of Signature Schemes Derived from Identification, (with K. Ohta), the proceedings of Crypto'98, LNCS 1462, Springer-Verlag, pp354-369 (1998).
- EPOC: Efficient Probabilistic Public-Key Encryption, (with S.Uchiyama and E.Fujisaki), IEEE P1363 (1998).
- TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash, (with E.Fujisaki and H.Morita), IEEE P1363a (1998)
- Provable Security of Practical Public-Key Encryption Scheme, the proceedings of JWIS98 (1998)
- Oblivious Transfer Channels and Dealing Channels, DMTCS'99 (1999)
- How to Enhance the Security of Public-Key Encryptions at Minimum Cost, (with E. Fujisaki), the proceedings of PKC'99, LNCS 1560, Springer-Verlag, pp.53-68 (1999).
- Secure Integration of Asymmetric and Symmetric Encryption Schemes, (with E. Fujisaki), the proceedings of Crypto99, LNCS 1666, Springer-Verlag, pp.537-554 (1999).
- A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), the proceedings of ASIACRYPTo99, LNCS 1716, Springer-Verlag, pp.378-389 (1999).
- Quantum Public-Key Cryptosystems, (with K.Tanaka and S.Uchiyama), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
- Provably Secure Partially Blind Signatures, (with M.Abe), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.271- 286 (2000).
- The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes, (with D. Pointcheval), the proceedings of PKC01, LNCS 1992, Springer-Verlag, pp.104-118 (2001).
- REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform, (with D. Pointcheval), the proceedings of Cryptographers Track at RSA Conference01 (CT-RSA01), LNCS 2020, Springer-Verlag, pp.159-175 (2001).
- RSA-OAEP is Secure under the RSA Assumption, (with E. Fujisaki, D. Pointcheval and J. Stern), the proceedings of Crypto01, LNCS 2139, Springer-Verlag, pp.260-274 (2001)
- A New Approach to Knapsack Cryptosystems (Extended Abstract), (with K. Tanaka), the proceedings of WISA2002, Vol.3, pp.33-42 (2002).
- Almost Uniform Density of Power Residues and the Provable Security of ESIGN, (with J. Stern), the proceedings of ASIACRYPT 2003, LNCS 2894, Springer, pp.287--301 (2003).
- Resource Bounded Unprovability of Computational Lower Bounds, the Proceedings of Workshop on Cryptography and Related Mathematics, Chuo University, ePrint Archive 2003/187, IACR, http://eprint.iacr.org/ (2003)
- An RSA Family of Trap-door Permutations with a Common Domain and Its Application, (with R. Hayashi and K. Tanaka), the proceedings of PKC'04, LNCS, Springer-Verlag (2004)
- A Universal Composable Channel Based on the KEM-DEM Framework, (with W. Nagao and Y. Manabe) the proceedings of TCC'05, LNCS, Springer-Verlag (2005).
- Efficient Blind and Partially Blind Signatures Without Random Oracles, the proceedings of TCC'06, LNCS, Springer-Verlag (2006).
- Cryptography Based on Bilinear Maps, the proceedings of AAECC-16} LNCS 3857, Springer-Verlag, pp.35-50 (2006).
- On Pairing-Based Cryptosystems, the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.50-66 (2006).
- Universally Composable Identity-Based Encryption, (with R. Nishimaki and Y. Manabe) the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.337-353 (2006).
- Authenticated Key Exchange and Key Encapsulation in the Standard Model, the proceedings of ASIACRYPT 2007, LNCS 4833, Springer-Verlag, pp.474-484, (2007).
- Relationship of Three Cryptographic Channels in the UC Framework, (with W. Nagao and Y. Manabe) the proceedings of ProvSec 2008, LNCS 5324, Springer-Verlag, pp. 268-282, (2008).
- Homomorphic Encryption and Signatures from Vector Decomposition, (with K. Takashima) the proceedings of Pairing 2008, LNCS 5209, Springer-Verlag, pp.57-74, (2008).
- An Efficient Anonymous Credential System, (with N. Akagi and Yoshifumi Manabe) the proceedings of Financial Cryptography 2008, LNCS 5143, Springer-Verlag, pp. 272-286, (2008).
- Chosen Ciphertext Security with Optimal Ciphertext Overhead, (with M. Abe and E. Kiltz) the proceedings of ASIACRYPT 2008, LNCS 5350, Springer-Verlag, pp. 355-371, (2008).
- Compact CCA-Secure Encryption for Messages of Arbitrary Length, (with M. Abe) the proceedings of PKC 2009, LNCS 5443, Springer Springer-Verlag, pp. 377-392, (2009).
- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles, (with D. Moriyama) the proceedings of ProvSec 2009, LNCS 5848, Springer Springer-Verlag, pp. 154-167, (2009).
- Hierarchical Predicate Encryption for Inner-Products, (with K. Takashima) the proceedings of ASIACRYPT 2009, LNCS 5912, Springer Springer-Verlag, pp. 214-231, (2009).
- Meta-Envy-Free Cake-Cutting Protocols, (with Y. Manabe) the proceedings of MFCS 2010, LNCS 6281, Springer-Verlag, pp. 501-512, (2010).
- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption, (with T. Mitsunaga and Y. Manabe) the proceedings of IWSEC 2010, LNCS6434, Springer-Verlag, pp. 149-163, (2010).
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, (with A. B. Lewko, A. Sahai, K. Takashima and B. Waters) the proceedings of EUROCRYPT 2010, LNCS 6110, Springer-Verlag, pp. 62-91, (2010).
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, (with K. Takashima) the proceedings of CRYPTO 2010, LNCS 6223, Springer-Verlag, pp. 191-208, (2010).
- Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model, (with K. Takashima) the proceedings of PKC 2011, LNCS 6571, Springer-Verlag, pp. 35-52, (2011).
- A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits, (with T. Mitsunaga and Y. Manabe) the proceedings of IWSEC 2011, LNCS 7038, Springer-Verlag, pp. 51-64, (2011).
- Leakage resilient eCK-secure key exchange protocol without random oracles, (with D. Moriyama) the proceedings of ASIACCS 2011, pp. 441-447, (2011).
- Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption, (with K. Takashima) the proceedings of CANS 2011, LNCS 7092, Springer-Verlag, pp. 138-159, (2011).
- Some Key Techniques on Pairing Vector Spaces, (with K. Takashima) the proceedings of AFRICACRYPT 2011, LNCS 6737, Springer-Verlag, pp. 380-382, (2011).
- A Cryptographic Moving-Knife Cake-Cutting Protocol, (with Y. Manabe) the proceedings of IWIGP 2012, pp. 15-23, (2012).
- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security, (with S. Kiyoshima and Y. Manabe) the proceedings of IWSEC 2012, LNCS 7631, Springer-Verlag, pp. 216-232, (2012).
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption, (with K. Takashima) the proceedings of EUROCRYPT 2012, LNCS 7237, Springer-Verlag, pp. 591-608, (2012).
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, (with K. Takashima) the proceedings of ASIACRYPT 2012, LNCS 7658, Springer-Verlag, pp. 349-366, (2012).
- Decentralized Attribute-Based Signatures, (with K. Takashima) the proceedings of PKC 2013, LNCS 7778, Springer-Verlag, pp. 125-142, (2013).
- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol, (with S. Kiyoshima and Y. Manabe) the proceedings of TCC 2014, LNCS 8349, Springer-Verlag, pp. 343-367, (2014).
- Packing Messages and Optimizing Bootstrapping in GSW-FHE, (with R. Hiromasa and M. Abe) the proceedings of PKC 2015, LNCS 9020, Springer-Verlag, pp. 699-715, (2015).