Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tatsuaki Okamoto is active.

Publication


Featured researches published by Tatsuaki Okamoto.


theory and application of cryptographic techniques | 2010

Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption

Allison B. Lewko; Tatsuaki Okamoto; Amit Sahai; Katsuyuki Takashima; Brent Waters

We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. We construct our ABE scheme in composite order bilinear groups, and prove its security from three static assumptions. Our ABE scheme supports arbitrary monotone access formulas. Our predicate encryption scheme is constructed via a new approach on bilinear pairings using the notion of dual pairing vector spaces proposed by Okamoto and Takashima.


Archive | 2018

Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption

Pratish Datta; Tatsuaki Okamoto; Katsuyuki Takashima

This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standard computational assumptions in bilinear groups. Our main result is a simulation-based adaptively strongly partially-hidingPE (PHPE) scheme for predicates computing arithmetic branching programs (ABP) on public attributes, followed by an inner-product predicate on private attributes. This simultaneously generalizes attribute-based encryption (ABE) for boolean formulas and ABP’s as well as strongly attribute-hiding PE schemes for inner products. The proposed scheme is proven secure for any a priori bounded number of ciphertexts and an unbounded (polynomial) number of decryption keys, which is the best possible in the simulation-based adaptive security framework. This directly implies that our construction also achieves indistinguishability-based strongly partially-hiding security against adversaries requesting an unbounded (polynomial) number of ciphertexts and decryption keys. The security of the proposed scheme is derived under (asymmetric version of) the well-studied decisional linear (DLIN) assumption. Our work resolves an open problem posed by Wee in TCC 2017, where his result was limited to the semi-adaptive setting. Moreover, our result advances the current state of the art in both the fields of simulation-based and indistinguishability-based strongly attribute-hiding PE schemes. Our main technical contribution lies in extending the strong attribute hiding methodology of Okamoto and Takashima [EUROCRYPT 2012, ASIACRYPT 2012] to the framework of simulation-based security and beyond inner products.


Archive | 2010

CRYPTOGRAPHIC PROCESSING SYSTEM

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2010

Cipher processing system, key generating device, key delegating device, encrypting device, decrypting device, cipher processing method, and cipher processing program

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2013

Cryptographic system, cryptographic method, cryptographic program, and decryption device

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2011

CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, KEY DELEGATION DEVICE, CRYPTOGRAPHIC PROCESSING METHOD, AND CRYPTOGRAPHIC PROCESSING PROGRAM

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2011

Encryption processing system, key generation device, encryption device, decryption device, key delegation device, encryption processing method, and encryption processing program

Katsuyuki Takashima; 克幸 高島; Tatsuaki Okamoto; 岡本 龍明


Archive | 2013

Système de cryptage

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2013

Cryptographic system, cryptographic method, and cryptographic program

Katsuyuki Takashima; Tatsuaki Okamoto


Archive | 2013

Encryption system, encryption method, encryption program and decryption device

Katsuyuki Takashima; Tatsuaki Okamoto

Collaboration


Dive into the Tatsuaki Okamoto's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar

Brent Waters

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Pratish Datta

Indian Institute of Technology Kharagpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge