S. S. Al-riyami and K. Paterson, Certificateless Public Key Cryptography, Advances in Cryptology -Asiacrypt 2003, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

S. S. Al-riyami and K. Paterson, CBE from CL-PKE: A Generic Construction and Efficient Schemes, Public Key Cryptography -PKC 2005, pp.398-415, 2005.
DOI : 10.1007/978-3-540-30580-4_27

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006.
DOI : 10.1145/1127345.1127346

G. Ateniese, K. Benson, and S. Hohenberger, Key-Private Proxy Re-encryption, Cryptography ePrint Archive Report, vol.463, 2008.
DOI : 10.1007/978-3-540-78440-1_21

J. Baek, R. Safavi-naini, and W. Susilo, Certificateless Public Key Encryption Without Pairing, ISC 2005, pp.134-148, 2005.
DOI : 10.1007/11556992_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, Advances in Cryptology -Eurocrypt' 98, LNCS 1403, pp.127-144, 1998.
DOI : 10.1007/BFb0054122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246

D. Boneh and X. Boyen, Efficient selective-id secure identity based encryption without random oracles Advances in Cryptology -Eurocrypt, LNCS, vol.3027, pp.223-238, 2004.

D. Boneh and M. Franklin, Identity-based encryption from the weil paring Advances in Cryptology -Crypto, LNCS, vol.2139, pp.213-229, 2001.

R. Canetti and S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315269

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.3857

R. H. Deng, J. Weng, S. Liu, and K. Chen, Chosen-ciphertext secure proxy reencryption without pairings, CANS 2008, pp.1-17, 2008.
DOI : 10.1007/978-3-540-89641-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.3091

E. Fujisaki and T. Okamoto, How to Enhance the Security of Public-Key Encryption at Minimum Cost, Public Key Cryptography -PKC' 99, pp.53-68, 1999.
DOI : 10.1007/3-540-49162-7_5

M. Green and G. Ateniese, Identity-Based Proxy Re-encryption, Cryptography ePrint Archive Report, p.473, 2006.
DOI : 10.1007/978-3-540-72738-5_19

B. Libert and J. Quisquater, On Constructing Certificateless Cryptosystems from Identity Based Encryption, Public Key Cryptography -PKC 2006, pp.474-490, 2006.
DOI : 10.1007/11745853_31

B. Libert and D. Vergnaud, Unidirectional chosen-ciphertext secure proxy reencryption, Public Key Cryptography -PKC 2008, pp.360-379, 2008.
DOI : 10.1007/978-3-540-78440-1_21

URL : https://hal.archives-ouvertes.fr/inria-00339530

J. Shao and Z. Cao, CCA-Secure Proxy Re-encryption without Pairings, Public Key Cryptography -PKC 2009, pp.357-376, 2009.
DOI : 10.1007/978-3-642-00468-1_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.9939