| 1 | 2010 | PKC | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model | pkc | 261-278 |
| 2 | 2010 | Security of Encryption Schemes in Weakened Random Oracle Models | pkc | 403-419 |
| 3 | 2010 | Security of Encryption Schemes in Weakened Random Oracle Models | eprint | online |
| 4 | 2009 | Efficient Public Key Encryption Based on Ideal Lattices | asiacrypt | 617-635 |
| 5 | 2008 | Security of Digital Signature Schemes in Weakened Random Oracle Models | pkc | 268-287 |
| 6 | 2008 | Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems | asiacrypt | 372-389 |
| 7 | 2007 | Multi-bit Cryptosystems Based on Lattice Problems | pkc | 315-329 |
| 8 | 2005 | Universally Anonymizable Public-Key Encryption | asiacrypt | online |
| 9 | 2005 | The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity | pkc | online |
| 10 | 2004 | An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications | pkc | online |
| 11 | 2000 | Quantum Public-Key Cryptosystems | crypto | 147-165 |
Coauthors of Keisuke Tanaka |