フェロー/上席特別研究員/特別研究員

フェロー 岡本 龍明
  • フェロー

    岡本 龍明

  • NTT社会情報研究所
    暗号・情報セキュリティ研究所
    NTT Research, Inc. CIS Lab 所長

暗号理論の研究

著書

  • 「暗号・ゼロ知識証明・数論」(共立出版)1995
  • 「現代暗号」(産業図書)1997
  • 「暗号と情報セキュリティ」(日経BP社)1998
  • 「情報セキュリティ技術」(電気通信協会)2000
  • 「現代暗号・確率的証明・擬似乱数」(翻訳)(シュプリンガ-フェアラーク社) 2001
  • 「公開鍵暗号の数理」(共立出版)2011
  • 「量子計算」(近代科学社)2015
  • 「現代暗号の誕生と発展」(近代科学社)2019

表彰

  • 1992年 NTT 研究開発本部長表彰・研究開発賞
  • 1993年 電子情報通信学会業績賞、小林記念特別賞「公開鍵認証方式に関する研究」
  • 1995年 NTT 研究開発本部長表彰・研究開発賞
  • 1997年 電気通信普及財団賞(テレコムシステム技術賞)「理想的電子現金方式の一方法」
  • 1998年 科学技術庁長官賞(研究功績者賞)「効率的な電子署名方式に関する研究」
  • 1999年 NTT R&Dフェロー
  • 2000年 日経BP技術賞「安全性を数学的に証明しただ円曲線暗号PSEC」
  • 2003年 電子情報通信学会フェロー
  • 2007年 Certicom社(カナダ) ECC Technology Award
  • 2008年 経済産業省 商務情報政策局長表彰 情報セキュリティ促進部門
  • 2009年 国際暗号学会(IACR) IACR Distinguished Lecture
  • 2009年 情報セキュリティ大学院大学 情報セキュリティ文化賞
  • 2011年 社団法人 電子情報通信学会 功績賞
  • 2011年 日本応用数理学会 フェロー
  • 2012年 紫綬褒章
  • 2015年 国際暗号学会(IACR) フェロー
  • 2016年 社団法人 電子情報通信学会  論文賞
  • 2017年 RSA会議賞 数学分野
  • 2017年 社団法人 電子情報通信学会  論文賞
  • 2017年 日本応用数理学会 業績賞
  • 2019年 朝日賞
  • 2020年 電子情報通信学会業績賞「公開鍵暗号に対する汎用的な変換方式の先駆的研究」

学会役員等

  • 国際暗号学会(IACR)理事(1998~2000)
  • 日本応用数理学会 理事(1999~)
  • 日本応用数理学会 会長(2007.4~2008.3)
  • 電子情報通信学会・情報セキュリティ研究専門委員長(1999.5~2000.4)
  • 電子情報通信学会・和文論文誌「代数曲線とその応用」特集号編集委員長(1999.8)
  • 日本応用数理学会「数論アルゴリズムとその応用」研究部会幹事(2000~)
  • 電子情報通信学会・英文論文誌「暗号と情報セキュリチィ」特集号編集委員長(2000.1)
  • 電子情報通信学会 理事(2001.5~2003.4)
  • 日本数学協会 理事(2002~2005)
  • 電子情報通信学会・「基礎・境界ソサイエティ フェロー推薦委員会」委員(2003~2005)
  • 電子情報通信学会・「論文賞委員会」(2005)
  • 日本応用数理学会「JJAM(日本応用数理学会 英文論文誌)」編集委員 (2005~2009)
  • 電子情報通信学会 基礎・境界ソサイエティ副会長(2010)
  • 韓国数学会英文論文誌編集委員
  • Journal of AAECC 編集委員
  • Journal of Cryptology 編集委員
  • Journal of Applied Cryptology 編集委員

国際会議委員等

国際会議運営委員

  • PKC (The International Conference on Theory and Practice of Public-Key Cryptography) (2004~)
  • TCC (Theory of Cryptography Conference) (2003~2016)
  • Pairing(2007~2015)

国際会議プログラム委員長

  • ICICS'97 (International Conference on Information and Communications Security)
  • ASIACRYPT 2000
  • ICICS'01
  • CT-RSA'04 (The Cryptographers' Track at the RSA Conference)
  • MAPTIC 2005 (Workshop on Mathematical Problems and Techniques in Cryptography)
  • PKC 2007 (The International Conference on Theory and Practice of Public-Key Cryptography)
  • Pairing 2007 (International Conference on Pairing-based Cryptography)
  • CANS 2007 (International Conference on Cryptology and Network Security)
  • FC 2015 (Financial Cryptography and Data Security )
  • ProvSec 2017(Provable Security)

国際会議実行委員長

  • TCC'13 (Theory of Cryptography Conference)
  • ProvSec'15 (International Conference on Provable Security)

国際会議プログラム委員

  • Eurocrypt'92,Crypto'93,Eurocrypt'94,ASIACRYPT'94,Eurocrypt'96,Crypto'97,PKC'98 (Public Key Cryptography ),PKC'99,ICISC'99 (International Conference on Information Security and Cryptology),ECIS'99 (European Colloid and Interface Society),ICICS'99,CARDIS '00,WISA '00 (The first Workshop on Information Security Applications),ICISC'01, PKC'01, Crypto'01,CT-RSA'02,PKC'02,Crypto'02,ICICS'02,PKC'03,CT-RSA'03,CCC'03 (Workshop on Coding, Cryptography and Combinatorics),ICISC'03,FC'04,Crypto'04,MyCrypt'05,ICALP'05,Eurocrypt'05,CT-RSA'06,FC'06,ICALP'06,SECRYPT'06,FC'07,ProvSec'07,Indocrypt'07,ACCS' 08,TCC' 08,SCN' 08,ASIACRYPT'08,SAC' 08,ProvSec'08,ICISC' 08,CANS' 08,IWSEC' 08,Eurocrypt'09, CosyProofs'09, Pairing' 09, ProvSec'09, Eurocrypt'10, ACNS' 10, ProvSec'10,CT-RSA' 11, Eurocrypt'11, CT-RSA' 12, Crypto'12,ASIACRYPT'12,PKC'13, ProvSec'13, ACISP'14, FC'14, ASIACRYPT'15, ArcticCrypt'16, ASIACRYPT'16, ASIACRYPT'17, ISC'17

公的活動

  • 情報処理振興事業協会:「コンピュータウィルス対策システム研究開発委員会」委員(1993~96)
  • 大蔵省:「電子マネー及び電子決済に関する懇談会」委員(1996~97)
  • 郵政省:「電子決済、電子現金とその利用環境整備に関する調査研究会」(1996)
  • 郵政省:「暗号通信のあり方に関する研究会」委員会委員(1999~2001)
  • 警察庁:「科学技術委員会委員」委員(1999~2000)
  • 郵政省:「暗号通信の普及・高度化に関する研究会」技術分科会構成員(2000)
  • 総務省、経産省:「暗号技術検討委員会/評価委員会委員」(2000~)
  • 「電子署名法及び認証業務に関する法律」における電子署名技術WG委員(2000~2005)
  • 情報処理振興事業協会:「情報セキュリティ関連事業推進委員会委員」委員(2000~)
  • 科学技術振興機構:「科学技術振興調整費審査ワーキンググループ委員」(2004~2006)
  • 産業技術総合研究所:「研究ユニット評価委員会」(2005~2010)
  • 科学技術振興機構:「情報と社会」研究開発領域 計画型研究開発「高度情報社会の脆弱性の解明と解決」評価委員(2005~2007)
  • 日本学術会議:連携会員

学位論文審査委員

  • スイス連邦工科大学(ETH)(スイス) M. Stadler氏・学位論文審査委員(U.Maurer:指導教授) (1996.5)
  • ENST(フランス) P. Paillier 氏・学位論文審査委員(D.Naccache:指導教授)(1999.9)
  • 北陸先端科学大学院大学・岡本健氏・学院論文審査委員(宮地充子:指導教授)(2001.12)
  • カタルーニャ工科大学(UPC) (スペイン) Javier Herranz 氏 (German Saez:指導教授) (2005.4)
  • ソウル大学(韓国) Namsu Jho 氏および Eunsun Yoo 氏 (Myung-Hwan Kim:指導教官) (2007.6)
  • 京都大学(日本) 岡田満雄 氏・学位論文審査委員(岡部寿男:指導教授)(2011.6)
  • ENS(フランス) M. Tibouch 氏・学位論文審査委員(D.Naccache:指導教授)(2011.9)
  • ソウル大学(韓国)Hyung Tae Lee 氏 (Jung Hee Cheon:指導教官) (2012.11)

客員教授等

  • カナダ Waterloo大学 客員助教授(1989.9~1990.8)
  • 東京都立大学数学科・非常勤講師(1998)
  • 大阪府立大学工学部・非常勤講師(1998)
  • 東京工業大学大学院・非常勤講師(1999)
  • 東京大学大学院数理科学研究科・客員教授(非常勤1999.4~2004.3)
  • 北陸先端科学大学院大学・非常勤講師(2000)
  • 鳥取大学工学部・非常勤講師(2001)
  • 新潟大学工学部・非常勤講師(2001)
  • 筑波大学大学院・客員教授(非常勤2001.4~2011.3)
  • 京都大学大学院情報学研究科・客員教授(非常勤2001.4~2018.3)
  • 御茶ノ水女子大学理学部・非常勤講師(2001)
  • 中央大学理工学部・非常勤講師(2002~2019)
  • 千葉大学大学院・非常勤講師(2004)
  • 愛媛大学大学院・非常勤講師(2008~)
  • 電気通信大学・非常勤講師 (2011)
  • 法政大学・非常勤講師 (2018~)

海外・国際会議での招待講演等

  • Waterloo University (カナダ)(1989.8~1990.8)
  • CWI(オランダ)(1990.7)
  • AT&T Bell Laboratories(米国)(1994.9~1995.8)
  • IBM Watson Research Labs(米国)(1995.3)
  • Waterloo University (カナダ)(1995.8)
  • Cambridge University (英国)(1996.3~4)
  • スイス連邦工科大学、チューリッヒ(ETH)(スイス)(1996.5)
  • Monash 大学(オーストラリア)(1996.8)
  • 電気通信特別講座(マレーシア)(1996.8)
  • Workshop on Cryptographic Protocols(スイス)(1998.3)
  • 台湾通信研究所(台湾)(1998.5)
  • GJCC (ドイツ) (1998.10)
  • JWIS'98, Workshop on CCNT(シンガポール)(1998.12)
  • PKC'99(日本) (1999.3)
  • 台北大学、高雄技術工科大学、台湾通信研究所(台湾)(1999.5)
  • IEEE Information Theory Workshop(南アフリカ)(1999.7)
  • Luminy Workshop on Cryptography(フランス)(1999.10)
  • Workshop on Cryptographic Protocols(スイス)(2001.3)
  • Korea University, KISA, Seongkyunkwan University (韓国) (2001.6)
  • IEEE Computer Elements Workshop (アメリカ)(2001.6)
  • スイス連邦工科大学、ローザンヌ(EPFL)(スイス) (2001.7)
  • IMS Workshop(シンガポール)(2001.9)
  • WPMC'01(デンマーク)(2001.9)
  • ECC'01、Waterloo University(カナダ)(2001.10)
  • WISA'02(韓国)(2002.8)
  • Dagstuhl Workshop on Cryptography(ドイツ)(2002.9)
  • Daewoo Workshop on Cryptography(韓国)(2004.6)
  • Luminy Workshop on Cryptography(フランス)(2004.11)
  • EU Workshop on Provable Security(フランス)(2004.11)
  • CRM(スペイン国立数学研究所)(スペイン)(2005.5~7)
  • ENS(フランス国立高等師範学校)(フランス)(2005.6)
  • ソウル大学(韓国)(2006.2)
  • AAECC2006 (アメリカ)(2006.2)
  • VietCrypt2006 (ベトナム) (2006.9)
  • ISITA 2006 (韓国) (2006.10)
  • UCLA (アメリカ) (2006.11)
  • Fields Institute (カナダ) (2006.12 )
  • ENS(フランス国立高等師範学校)(フランス)(2007.2~3)
  • UCL (ベルギー) (2007.3)
  • Bertinoro Workshop (イタリア) (2007.3)
  • ソウル大学(韓国)(2007.6)
  • NSRI(韓国)(2007.6)
  • KIAS-KMS Workshop (韓国) (2007.6)
  • Dagstuhl Workshop on Cryptography(ドイツ) (2007.9)
  • ASIACRYPT 07(マレーシア) (2007.12)
  • ISC 08 (台湾) (2008.9)
  • Chinacrypt 08 (中国) (2008.10)
  • IWCC 09 (中国) (2009.5)
  • COMPSAC&SAINT2009 (アメリカ) (2009.7)
  • ASIACRYPT 09 (日本) (2009.12)
  • 2010 UnB/ENE Graduate Program Summer School(ブラジル)(2010.2)
  • CosyProofs (フランス)(2010.4)
  • ルクセンブルク大学(ルクセンブルク)(2010.6)
  • 2010 International Workshop on Mathematical Crypto(韓国)(2010.8)
  • Africacrypt 11 (セネガル) (2011.7)
  • Dagstuhl Seminar Public-Key Cryptography(ドイツ)(2011.9)
  • ICICS2012(中国)(2012.10)
  • ICICS2013(中国)(2013.11)
  • Indocrypt 2013(インド)(2013.12)
  • CISC 2014(台湾) (2014.5)
  • ACISP 2014(オーストラリア) (2014.7)
  • Inscrypt 2014(中国) (2014.12)
  • AFRICACRYPT 2016(モロッコ) (2016.4)
  • ICITS2017(香港) (2017.12)

論文誌

  1. A Digital Signature Scheme Based on Polynomial Operations, (with A. Shiraishi), Systems and Computers in Japan, 17, 5, pp.36-44 (1986) translated from IECE Transactions, J68-D, 5, pp.1157-1164 (1985).
  2. A Single Public-Key Authentication Scheme for Multiple Users, Systems and Computers in Japan, 18, 10, pp.14-24 (1987) translated from IECE Transactions, J69-D, 10, pp.1481-1489 (1986).
  3. Fast Public-Key Cryptosystem Using Congruent Polynomial Equations, Electronics Letters, 22, 11, pp.581-582 (1986).
  4. Modification of a Public-Key Cryptosystem,  Electronics Letters, 23, 16, pp.814-815 (1987).
  5. Practical Extension of the Fiat-Shamir Scheme, (with K. Ohta), Electronics Letters, 24, 15, pp.955-956 (1988).
  6. A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems, ACM Transactions on Computer Systems, Vol.6, No.8, pp.432-441 (1988).
  7. Membership Authentication for Hierarchical Multigroups Using a Mater Key, (with K. Ohta), IEICE Transactions, Vol. E-73, No.7, pp.1107-1110 (1990).
  8. A Fast Signature Scheme Based on Congruential Polynomial Operations, IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47-53 (1990).
  9. Abuse of Undeniable Signatures and Their Countermeasures, (with K. Ohta and A. Fujioka), IEICE Transactions, Vol. E74, No.8, pp.2109-2113 (1991).
  10. Interactive Bi-proof Systems and Undeniable Signature Schemes, (with A. Fujioka and K. Ohta) IEICE Transactions, Vol. E-75-D, No. 1, pp. 102-109 (1992).
  11. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field, (with A. Menezes and S. Vanstone), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
  12. 理想的電子現金方式の一方法, (with K. Ohta), IEICE Transaction, Vol. J76-D-I, No.6, pp. 315-323 (1993).
  13. On the Complexity of the Discrete Logarithm for a General Finite, (with K. Sakurai and H. Shizuya), IEICE Transactions, Vol. E79-A , No. 1, pp. 61-65 (1996).
  14. One-Time Zero-Knowledge Authentication and Untraceable Cash, (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
  15. Security of the Modified Fiat-Shamir Schemes, (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
  16. Escraw Cash Systems, (with E. Fujisaki), IEICE Transactions, Vol. E81-A (1998), No. 1 (1998).
  17. Threshold Key-Recovery Systems for RSA, IEICE Transactions, Vol. E82-A, No. 1 (1999).
  18. Statistical Zero-Knowledge Protocols to Prove Modular] Polynomial Relations, (with E. Fujisaki), IEICE Transactions, Vol. E82-A, No. 1 (1999).
  19. Multi-Signature Schemes Secure against Active Insider Attacks, (with K. Ohta), IEICE Transactions, Vol. E82-A, No. 1 (1999).
  20. On Relationships between Statistical Zero-Knowledge Proofs, Journal of Comput. and System Sciences, 60, pp.47-108 (1999).
  21. How to Enhance the Security of Public-Key Encryptions at Minimum Cost, (with E. Fujisaki), IEICE Transactions, Vol. E83-A, No. 1, pp.147-165 (2000).
  22. A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), IEICE Transactions, Vol. E84-A, No. 1 (2001).
  23. A Chosen-Cipher Secure Encryption Scheme Tightly As Secure As Factoring, (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No. 1 (2001).
  24. How to Enhance the Security of Public-Key Encryption at Minimum Cost, (with E. Fujisaki), IEICE Transactions, Vol. E83-A, No.1, pp. 24-32(2000).
  25. A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring, (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No.1, pp. 179-187(2001).
  26. A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), IEICE Transactions, Vol. E84-A, No.1, pp. 197-204(2001).
  27. Delegation Chains Secure up to Constant Length, (with M. Abe), IEICE Transactions, Vol. E85-A, No.1, pp. 110-116 (2002).
  28. RSA-OAEP Is Secure under the RSA Assumption, (with E. Fujisaki, D. Pointcheval, and J. Stern), Journal of Cryptology, Vol. 17 (2004).
  29. A Universally Composable Secure Channel Based on the KEM-DEM Framework, (with W. Nagao and Y. Manabe), IEICE Transactions, Vol. E89-A, No.1, pp. 28-38 (2006).
  30. An optimistic fair exchange protocol and its security in the universal composability framework, (with Y. Okada and Y. Manabe), IJACT Transactions, Vol. 1, No. 1, pp. 70-77, (2008).
  31. On the Equivalence of Several Security Notions of KEM and DEM, (with W. Nagao and Y. Manabe), IEICE Transactions, Vol. E91-A, No.1, pp. 283-297, (2008).
  32. Universally Composable Identity-Based Encryption, (with R. Nishimaki and Y. Manabe), IEICE Transactions, Vol. E91-A, No.1, pp. 262-271, (2008).
  33. Chosen Ciphertext Security with Optimal Ciphertext Overhead, (with M. Abe and E. Kiltz), IEICE Transactions, Vol. E93-A, No.1, pp. 22-33, (2010).
  34. An eCK-secure Authenticated Key Exchange Protocol without Random Oracles, (with D. Moriyama), KSII Transactions, Vol. 5, No.3, pp. 607-625, (2011).
  35. Meta-envy-free Cake-cutting and Pie-cutting Protocols, (with Y. Manabe), JIP Transactions, Vol. 20, No.3, pp. 686-693, (2012).
  36. Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption, (with K. Takashima), IEICE Transactions, Vol. E96-A, No.1, pp. 42-52 (2013).
  37. Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption, (with T. Mitsunaga and Y. Manabe), IEICE Transactions, Vol. E96-A, No.1, pp. 68-75, (2013).
  38. Message Recovery Signature Schemes from Sigma-Protocols, (with M. Abe and K. Suzuki),  IEICE Transactions, Vol. E96-A, No.1, 92-100, (2013).
  39. Secure Integration of Asymmetric and Symmetric Encryption Schemes, (with E. Fujisaki), J. Cryptology Vol. 26, No.1, pp. 80-101, (2013).
  40. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model, (with K. Takashima), IEEE Transactions on Cloud Computing, Vol.2, No.4, pp. 409-421, (2014).
  41. A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus. (with Y. Manabe and R. Otsuka), Journal of Information Processing, Volume 23, pp. 299-304 (2015).
  42. Dual Pairing Vector Spaces and Their Applications, (with K. Takashima), IEICE Transactions, Vol.98-A, No. 1, pp.3-15, (2015).
  43. Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, (with K. Takashima), Des. Codes Cryptography, Vol. 77, Issue2, pp.725-771 (2015).
  44. A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits, (with T. Mitsunaga and Y. Manabe), IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 99-A, No8. pp. 1591-1599 (2016).
  45. Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption, (with K. Takashima), IEICE Transactions, Vol.99-A, No.1, pp.92-117 (2016).
  46. Packing Messages and Optimizing Bootstrapping in GSW-FHE, (with R. Hiromasa and M. Abe), IEICE Transactions, Vol. 99-A, No. 1, pp.73-82 (2016).
  47. Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption, (with K. Takashima), Journal of Cryptology, Volume 32, No.4, pp.1491-1573 (2019).
  48. Decentralized Attribute-Based Encryption and Signatures, (with K. Takashima), IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 103-A, No.1, pp. 41-73 (2020).
  49. Efficient Inner Product Functional Encryption with Full-Hiding Security, (with J. Tomida and M. Abe), IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 103-A, No.1, pp. 33-40 (2020).
  50. Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption, (with P. Datta and K. Takashima), IEICE Transactions on Information & Systems, Volume 103-D, No.1, pp. 1556-1597 (2020).
  51. Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs, (with P. Datta and K. Takashima), IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 104-A, No.1, pp. 25-57 (2021).

国際会議

  1. Modification of the Fiat-Shamir Scheme, (with K. Ohta), the proceedings of Crypto'88, LNCS 403, Springer-Verlag, pp.232-243 (1990).
  2. Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility, (with K. Ohta), the proceedings of Eurocrypt'89, LNCS, Springer-Verlag, pp.134-149 (1990).
  3. Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, (with K. Ohta), the proceedings of Crypto'89, LNCS, Springer-Verlag, pp.481-496 (1990).
  4. Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, (with K. Ohta and K. Koyama), the proceedings of Eurocrypt'90, LNCS 473, Springer-Verlag, pp.446-457 (1991).
  5. How to Utilize the Randomness of Zero-Knowledge Proofs, (with K. Ohta), the proceedings of Crypto'90, LNCS 537, Springer-Verlag, pp.456-475 (1991).
  6. ESIGN: An Efficient Digital Signature Implementation for Smart Cards, (with A. Fujioka and S. Miyaguchi), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.446-457 (1992).
  7. Interactive Bi-Proof Systems and Undeniable Signature Schemes, with A. Fujioka and K. Ohta, the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.243-256 (1992).
  8. Direct Zero Knowledge Proofs of Computational Power in Five Rounds, (with D. Chaum and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.96-105 (1992).
  9. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field, (with A. Menezes and S. Vanstone), the proceedings of STOC, pp.80-89 (1991).
  10. Universal Electronic Cash, (with K. Ohta), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.324-337 (1992).
  11. Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems, (with K. Sakurai), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.267-278 (1992)
  12. New Public-Key Schemes Based on Elliptic Curves over the Ring Z_n, (with K. Koyama, U.M. Maurer, and S.A. Vanstone), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.252-266 (1992)
  13. An Extension of Zero-Knowledge Proofs and Its Applications, the proceedings of ASIACRYPT'91, LNCS 739, Springer-Verlag, pp. 368-381(1992).
  14. A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, (with K. Ohta), the proceedings of ASIACRYPT'91, LNCS 739, Springer-Verlag, pp. 139-148 (1992).
  15. How Intractable Is the Discrete Logarithm for a General Finite Group, (with K. Sakurai and H. Shizuya), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.420-428 (1993).
  16. Secure Bit Commitment Function against Divertibility, (with K. Ohta and A. Fujioka), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.324-340 (1993).
  17. An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Z_n, (with A. Fujioka and E. Fujisaki), the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.54-65 (1993)
  18. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,  the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.31-53 (1993)
  19. A Practical Secret Voting Scheme for Large Scale Elections, (with A. Fujioka and K. Ohta), the proceedings of Auscrypt'92, LNCS, Springer--Verlag (1993).
  20. On Key Distribution and Authentication in Mobile Radio Networks, (with C. Park, K.Kurosawa, and S. Tsujii), the proceedings of Eurocrypt'93, LNCS, Springer-Verlag (1994).
  21. Survey of Digital Signature Schemes, (with K. Ohta),the proceedings of SPRC (the symposium on State and Progress of Research in Cryptography), Rome, pp.17-29 (1993)
  22. On the Relationship among Cryptographic Physical Assumptions, the Proceedings of ISAAC'93, LNCS 762, Springer-Verlag, pp. 369-378 (1993).
  23. Designated Confirmer Signatures and Public-Key Encryption Are Equivalent, the proceedings of Crypto'94, LNCS 839, Springer-Verlag, pp. 61-74 (1995).
  24. Simultaneous Secret Exchange Protocols Based on General Assumptions, (with K. Ohta), the Proceedings of the ACM Conference on Computer and Communications Security (1994).
  25. Zero-Knowledge Proofs of Computational Power in the Shared String Model, (with A. De Santis and G. Persiano), the proceedings of ASIACRYPT'94, LNCS, Springer-Verlag (1995).
  26. Single-Term Divisible Electronic Coins, (with T. Eng), the proceedings of Eurocrypt'94, LNCS 950, Springer-Verlag, pp.306-319 (1995).
  27. Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs, (with I. Damgaard, O. Goldreich and A. Wigderson), the proceedings of Crypto'95}, LNCS 963, Springer--Verlag, pp.325--338 (1995).
  28. An Efficient Divisible Electronic Cash Scheme, the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.438-451 (1995).
  29. Practical Escrow Cash Systems, (with E. Fujisaki), the proceedings of Security Protocols Workshop, LNCS 1189, Springer-Verlag, pp. 33-48 (1996).
  30. On Relationships between Statistical Zero-Knowledge Proofs, the proceedings of STOC, pp.649-658 (1996).
  31. An Electronic Voting Scheme, the proceedings of IFIP'96, IT Tools (1996).
  32. Receipt-Free Electronic Voting Schemes for Large Scale Elections, the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.25-36 (1997).
  33. Threshold Key-Recovery Systems for RSA, the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.192-200 (1997).
  34. Statistical Zero-Knowledge Protocols to Prove Polynomial Relations, (with E. Fujisaki), the proceedings of Crypto'97, LNCS1294, Springer-Verlag, pp16-30 (1997).
  35. Keeping the SZK-Verifier Honest Uncondi tionally, (with G. DiCrescenzo and M. Yung), the proceedings of Crypto'97, LNCS 1294, pp31-45 Springer-Verlag (1997).
  36. Lower Bounds on Term-Based Divisible Cash Systems, (with M. Yung), the proceedings of PKC'98, LNCS 1431, Springer-Verlag, pp72-82 (1998).
  37. NTT's Public-Key Cryptosystem and Electronic Money System, (with H.Kawahara and K.Koyama), the proceedings of PKS'98, Certicom (1998)
  38. Security of an Identity-Based Cryptosystem and the Related Reductions, (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp546-560 (1998).
  39. A Practical and Provably Secure Scheme for Publicly Secret Sharing and Its Application, (with E. Fujisaki), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp32-46 (1998).
  40. A Public-Key Cryptosystem as Secure as Factoring, (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp308-318 (1998).
  41. On Concrete Security Treatment of Signature Schemes Derived from Identification, (with K. Ohta), the proceedings of Crypto'98, LNCS 1462, Springer-Verlag, pp354-369 (1998).
  42. EPOC: Efficient Probabilistic Public-Key Encryption, (with S.Uchiyama and E.Fujisaki), IEEE P1363 (1998).
  43. TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash, (with E.Fujisaki and H.Morita), IEEE P1363a (1998)
  44. Provable Security of Practical Public-Key Encryption Scheme, the proceedings of JWIS98 (1998)
  45. Oblivious Transfer Channels and Dealing Channels, DMTCS'99 (1999)
  46. How to Enhance the Security of Public-Key Encryptions at Minimum Cost, (with E. Fujisaki), the proceedings of PKC'99, LNCS 1560, Springer-Verlag, pp.53-68 (1999).
  47. Secure Integration of Asymmetric and Symmetric Encryption Schemes, (with E. Fujisaki), the proceedings of Crypto'99, LNCS 1666, Springer-Verlag, pp.537-554 (1999).
  48. A Signature Scheme with Message Recovery as Secure as Discrete Logarithm, (with M. Abe), the proceedings of ASIACRYPTo'99, LNCS 1716, Springer-Verlag, pp.378-389 (1999).
  49. Quantum Public-Key Cryptosystems, (with K.Tanaka and S.Uchiyama), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
  50. Provably Secure Partially Blind Signatures, (with M.Abe), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.271- 286 (2000).
  51. The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes, (with D. Pointcheval), the proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp.104-118 (2001).
  52. REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform, (with D. Pointcheval), the proceedings of Cryptographers' Track at RSA Conference'01 (CT-RSA'01), LNCS 2020, Springer-Verlag, pp.159-175 (2001).
  53. RSA-OAEP is Secure under the RSA Assumption, (with E. Fujisaki, D. Pointcheval and J. Stern), the proceedings of Crypto'01, LNCS 2139, Springer-Verlag, pp.260-274 (2001)
  54. A New Approach to Knapsack Cryptosystems (Extended Abstract), (with K. Tanaka), the proceedings of WISA2002, Vol.3, pp.33-42 (2002).
  55. Almost Uniform Density of Power Residues and the Provable Security of ESIGN, (with J. Stern), the proceedings of ASIACRYPT 2003, LNCS 2894, Springer, pp.287--301 (2003).
  56. Resource Bounded Unprovability of Computational Lower Bounds, the Proceedings of Workshop on Cryptography and Related Mathematics, Chuo University, ePrint Archive 2003/187, IACR, http://eprint.iacr.org/ (2003)
  57. An RSA Family of Trap-door Permutations with a Common Domain and Its Application,  (with R. Hayashi and K. Tanaka), the proceedings of PKC'04, LNCS, Springer-Verlag (2004)
  58. A Universal Composable Channel Based on the KEM-DEM Framework, (with W. Nagao and Y. Manabe) the proceedings of TCC'05, LNCS, Springer-Verlag (2005).
  59. Efficient Blind and Partially Blind Signatures Without Random Oracles, the proceedings of TCC'06, LNCS, Springer-Verlag (2006).
  60. Cryptography Based on Bilinear Maps, the proceedings of AAECC-16} LNCS 3857, Springer-Verlag, pp.35-50 (2006).
  61. On Pairing-Based Cryptosystems, the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.50-66 (2006).
  62. Universally Composable Identity-Based Encryption, (with R. Nishimaki and Y. Manabe) the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.337-353 (2006).
  63. Authenticated Key Exchange and Key Encapsulation in the Standard Model, the proceedings of ASIACRYPT 2007, LNCS 4833, Springer-Verlag, pp.474-484, (2007).
  64. Relationship of Three Cryptographic Channels in the UC Framework, (with W. Nagao and Y. Manabe) the proceedings of ProvSec 2008, LNCS 5324, Springer-Verlag, pp. 268-282, (2008).
  65. Homomorphic Encryption and Signatures from Vector Decomposition, (with K. Takashima) the proceedings of Pairing 2008, LNCS 5209, Springer-Verlag, pp.57-74, (2008).
  66. An Efficient Anonymous Credential System, (with N. Akagi and Yoshifumi Manabe) the proceedings of Financial Cryptography 2008, LNCS 5143, Springer-Verlag, pp. 272-286, (2008).
  67. Chosen Ciphertext Security with Optimal Ciphertext Overhead, (with M. Abe and E. Kiltz) the proceedings of ASIACRYPT 2008, LNCS 5350, Springer-Verlag, pp. 355-371, (2008).
  68. Compact CCA-Secure Encryption for Messages of Arbitrary Length, (with M. Abe) the proceedings of PKC 2009, LNCS 5443, Springer Springer-Verlag, pp. 377-392, (2009).
  69. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles, (with D. Moriyama) the proceedings of ProvSec 2009, LNCS 5848, Springer Springer-Verlag, pp. 154-167, (2009).
  70. Hierarchical Predicate Encryption for Inner-Products, (with K. Takashima) the proceedings of ASIACRYPT 2009, LNCS 5912, Springer Springer-Verlag, pp. 214-231, (2009).
  71. Meta-Envy-Free Cake-Cutting Protocols, (with Y. Manabe) the proceedings of MFCS 2010, LNCS 6281, Springer-Verlag, pp. 501-512, (2010).
  72. Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption, (with T. Mitsunaga and Y. Manabe) the proceedings of IWSEC 2010, LNCS6434, Springer-Verlag, pp. 149-163, (2010).
  73. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, (with A. B. Lewko, A. Sahai, K. Takashima and B. Waters) the proceedings of EUROCRYPT 2010, LNCS 6110, Springer-Verlag, pp. 62-91, (2010).
  74. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, (with K. Takashima) the proceedings of CRYPTO 2010, LNCS 6223, Springer-Verlag, pp. 191-208, (2010).
  75. Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model, (with K. Takashima) the proceedings of PKC 2011, LNCS 6571, Springer-Verlag, pp. 35-52, (2011).
  76. A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits, (with T. Mitsunaga and Y. Manabe) the proceedings of IWSEC 2011, LNCS 7038, Springer-Verlag, pp. 51-64, (2011).
  77. Leakage resilient eCK-secure key exchange protocol without random oracles, (with D. Moriyama) the proceedings of ASIACCS 2011, pp. 441-447, (2011).
  78. Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption, (with K. Takashima) the proceedings of CANS 2011, LNCS 7092, Springer-Verlag, pp. 138-159, (2011).
  79. Some Key Techniques on Pairing Vector Spaces, (with K. Takashima) the proceedings of AFRICACRYPT 2011, LNCS 6737, Springer-Verlag, pp. 380-382, (2011).
  80. A Cryptographic Moving-Knife Cake-Cutting Protocol, (with Y. Manabe) the proceedings of IWIGP 2012, pp. 15-23, (2012).
  81. Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security, (with S. Kiyoshima and Y. Manabe) the proceedings of IWSEC 2012, LNCS 7631, Springer-Verlag, pp. 216-232, (2012).
  82. Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption, (with K. Takashima) the proceedings of EUROCRYPT 2012, LNCS 7237, Springer-Verlag, pp. 591-608, (2012).
  83. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, (with K. Takashima) the proceedings of ASIACRYPT 2012, LNCS 7658, Springer-Verlag, pp. 349-366, (2012).
  84. Decentralized Attribute-Based Signatures, (with K. Takashima) the proceedings of PKC 2013, LNCS 7778, Springer-Verlag, pp. 125-142, (2013).
  85. Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol, (with S. Kiyoshima and Y. Manabe) the proceedings of TCC 2014, LNCS 8349, Springer-Verlag, pp. 343-367, (2014).
  86. Packing Messages and Optimizing Bootstrapping in GSW-FHE, (with R. Hiromasa and M. Abe) the proceedings of PKC 2015, LNCS 9020, Springer-Verlag, pp. 699-715, (2015).
  87. New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. (with K. Pietrzak, B. Waters, D. Wichs) the proceedings of ASIACRYPT 2015, LNCS 9452, Springer-Verlag, pp 121-145 (2015).
  88. Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security, (with J. Tomida and M. Abe), ISC 2016: 408-425 (2016).
  89. Signature Schemes with Randomized Verification (with C. Freitag, R. Goyal, S. Hohenberger, V. Koppulaand, E. Lee, J. Tran, B. Waters), ACNS 2017: 379-389 (2017).
  90. Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption, (with P. Datta and J. Tomida), Public Key Cryptography 2018: 245-277 (2018).
  91. Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption, (with P. Datta and K. Takashima), ASIACRYPT 2018: 640-672 (2018).
  92. Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs. (with P. Datta and K. Takashima), Public Key Cryptography 2019: 127-158 (2019).

関連するコンテンツ