M. Abdalla, A. Dent, J. Malone-lee, G. Neven, D. Phan et al., Identity-Based Traitor Tracing, PKC'07, vol.4450, pp.361-376, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00918560

M. Abdalla, E. Kiltz, and G. Neven, Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, vol.4734, pp.139-154, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00918551

S. Al-riyami and K. Paterson, Certificateless Public Key Cryptography, Asiacrypt'03, vol.2894, pp.452-473, 2003.

M. Au, Q. Huang, J. Liu, W. Susilo, D. Wong et al., Traceable and Retrievable Identity-Based Encryption, ACNS'08, vol.5037, pp.94-110, 2008.

O. Baudron, D. Pointcheval, and J. Stern, Extended Notions of Security for Multicast Public Key Cryptosystems, ICALP'00, vol.1853, pp.499-511, 2000.

M. Bellare and T. Ristenpart, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme, Eurocrypt'09, vol.5479, pp.407-424, 2009.

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, vol.3027, pp.223-238, 2004.

D. Boneh and X. Boyen, Secure Identity-Based Encryption Without Random Oracles, Crypto'04, vol.3152, pp.443-459, 2004.

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity-Based encryption with Constant Size Ciphertext, Eurocrypt'05, vol.3494, pp.440-456, 2005.

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, earlier version in Crypto'01, vol.32, pp.213-229, 2001.

D. Boneh, C. Gentry, and M. , Hamburg Space-Efficient Identity-Based Encryption Without Pairings, FOCS'07, pp.647-657, 2007.

D. Boneh and M. Hamburg, Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, vol.5350, pp.455-470, 2008.

D. Boneh and J. Katz, Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, CT-RSA'05, vol.3376, pp.87-103, 2005.

X. Boyen, Q. Mei, and B. Waters, Direct Chosen Ciphertext Security from Identity-Based Techniques, ACM CCS'05, pp.320-329, 2005.

X. Boyen and B. Waters, Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), Crypto'06, vol.4117, pp.290-307, 2006.

R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, vol.2656, pp.254-271, 2003.

R. Canetti, S. Halevi, and J. Katz, Chosen-Ciphertext Security from Identity-Based Encryption, Eurocrypt'04, vol.3027, pp.207-222, 2004.

J. H. Cheon, Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, vol.4004, pp.1-11, 2006.

C. Cocks, An Identity-Based Encryption Scheme Based on Quadratic Residues, 8th IMA International Conference, vol.2260, pp.360-363, 2001.

R. Cramer and V. Shoup, A Practical Public-Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack, Crypto'98, vol.1462, pp.13-25, 1998.

R. Cramer and V. Shoup, Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, Eurocrypt'02, vol.2332, pp.45-64, 2002.

C. Delerablée, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt'07, vol.4833, pp.200-215, 2007.

S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, vol.156, pp.3113-3121, 2008.

C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, Eurocrypt'03, vol.2656, pp.272-293, 2003.

C. Gentry, Practical Identity-Based Encryption Without Random Oracles, Eurocrypt'06, vol.4004, pp.445-464, 2006.

C. Gentry and B. Waters, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Eurocrypt'09, vol.5479, pp.171-188, 2009.

R. Granger and N. P. Smart, On Computing Products of Pairings, 2006.

C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, Asiacrypt'02, vol.2501, pp.548-566, 2002.

V. Goyal, Reducing Trust in the PKG in Identity-Based Cryptosystems, Crypto'07, vol.4622, pp.430-447, 2007.

V. Goyal, S. Lu, A. Sahai, and B. Waters, Black-Box Accountable Authority Identity Based Encryption, ACM-CCS'08, 2008.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, ACM CCS'06, pp.89-98, 2006.

D. Hofheinz and E. Kiltz, Secure Hybrid Encryption from Weakened Key Encapsulation, Crypto'07, vol.4622, pp.553-571, 2007.

A. Kiayias and M. Yung, Updated version available as Cryptology ePrint Archive, Eurocrypt'02, vol.2332, pp.450-465, 2002.

E. Kiltz and Y. Vahlis, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption In CT-RSA'08, vol.4964, pp.221-238, 2008.

K. Kurosawa and Y. Desmedt, A New Paradigm of Hybrid Encryption Scheme, Crypto'04, vol.3152, pp.445-456, 2004.

B. Libert and D. Vergnaud, Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, PKC'09, vol.5443, pp.235-255, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00356999

T. Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Crypto'92, vol.740, pp.31-53, 2002.

T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Crypto'91, vol.576, pp.129-140, 1991.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption In Eurocrypt'05, vol.3494, pp.457-473, 2005.

R. Sakai and M. Kasahara, ID-based Cryptosystems with Pairing on Elliptic Curve, SCIS'03, 2003.

P. Sarkar and S. Chatterjee, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, ProvSec'07, vol.4784, pp.51-67, 2007.

C. P. Schnorr, Efficient Identification and Signatures for Smart Cards, Crypto'89, vol.435, pp.239-252, 1989.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Crypto'84, vol.196, pp.47-53, 1984.

V. Shoup and R. Gennaro, A Note on An Encryption Scheme of Kurosawa and Desmedt, Cryptology ePrint Archive, 2004.

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt'05, vol.3494, pp.114-127, 2005.