Tatsuaki Okamoto
University of California, Los Angeles
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tatsuaki Okamoto.
theory and application of cryptographic techniques | 2010
Allison B. Lewko; Tatsuaki Okamoto; Amit Sahai; Katsuyuki Takashima; Brent Waters
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product predicates. In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. We construct our ABE scheme in composite order bilinear groups, and prove its security from three static assumptions. Our ABE scheme supports arbitrary monotone access formulas. Our predicate encryption scheme is constructed via a new approach on bilinear pairings using the notion of dual pairing vector spaces proposed by Okamoto and Takashima.
Archive | 2018
Pratish Datta; Tatsuaki Okamoto; Katsuyuki Takashima
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standard computational assumptions in bilinear groups. Our main result is a simulation-based adaptively strongly partially-hidingPE (PHPE) scheme for predicates computing arithmetic branching programs (ABP) on public attributes, followed by an inner-product predicate on private attributes. This simultaneously generalizes attribute-based encryption (ABE) for boolean formulas and ABP’s as well as strongly attribute-hiding PE schemes for inner products. The proposed scheme is proven secure for any a priori bounded number of ciphertexts and an unbounded (polynomial) number of decryption keys, which is the best possible in the simulation-based adaptive security framework. This directly implies that our construction also achieves indistinguishability-based strongly partially-hiding security against adversaries requesting an unbounded (polynomial) number of ciphertexts and decryption keys. The security of the proposed scheme is derived under (asymmetric version of) the well-studied decisional linear (DLIN) assumption. Our work resolves an open problem posed by Wee in TCC 2017, where his result was limited to the semi-adaptive setting. Moreover, our result advances the current state of the art in both the fields of simulation-based and indistinguishability-based strongly attribute-hiding PE schemes. Our main technical contribution lies in extending the strong attribute hiding methodology of Okamoto and Takashima [EUROCRYPT 2012, ASIACRYPT 2012] to the framework of simulation-based security and beyond inner products.
Archive | 2010
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2010
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2013
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2011
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2011
Katsuyuki Takashima; 克幸 高島; Tatsuaki Okamoto; 岡本 龍明
Archive | 2013
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2013
Katsuyuki Takashima; Tatsuaki Okamoto
Archive | 2013
Katsuyuki Takashima; Tatsuaki Okamoto