DHIES: an encryption scheme based on the Diffie-Hellman problem, 1998. ,
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, LNCS, vol.1807, pp.259-274, 2000. ,
DOI : 10.1007/3-540-45539-6_18
Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing, ICDS, 2005. ,
Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001. ,
Functional Encryption: Definitions and Challenges, LNCS, vol.6597, pp.253-273, 2011. ,
DOI : 10.1007/978-3-642-19571-6_16
A Posteriori Openable Public Key Encryption, 2015. ,
DOI : 10.1007/978-3-319-33630-5_2
URL : https://hal.archives-ouvertes.fr/hal-01369535
Deniable Encryption, CRYPTO'97, pp.90-104, 1997. ,
DOI : 10.1007/BFb0052229
Efficient and non-interactive timedrelease encryption, ICICS 05, pp.291-303, 2005. ,
Timed-Release and Key-Insulated Public Key Encryption, LNCS, vol.4107, pp.191-205, 2006. ,
DOI : 10.1007/11889663_17
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003. ,
DOI : 10.1137/S0097539702403773
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability, LNCS, vol.4779, pp.158-174, 2007. ,
DOI : 10.1007/978-3-540-75496-1_11
Key-Insulated Public Key Cryptosystems, EUROCRYPT 2002, pp.65-82, 2002. ,
DOI : 10.1007/3-540-46035-7_5
Secure Integration of Asymmetric and Symmetric Encryption Schemes, Journal of Cryptology, vol.14, issue.1, pp.80-101, 2013. ,
DOI : 10.1007/s00145-011-9114-1
On the security of public key cryptosystems with a double decryption mechanism, Information Processing Letters, vol.108, issue.5, pp.279-283, 2008. ,
DOI : 10.1016/j.ipl.2008.05.017
Self-delegation with controlled propagation ??? or ??? What if you lose your laptop, CRYPTO'98, pp.153-168, 1998. ,
DOI : 10.1007/BFb0055726
How to Run Turing Machines on Encrypted Data, CRYPTO 2013, pp.536-553, 2013. ,
DOI : 10.1007/978-3-642-40084-1_30
Reusable garbled circuits and succinct functional encryption, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.555-564, 2013. ,
DOI : 10.1145/2488608.2488678
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
Generic Constructions of Parallel Key-Insulated Encryption, SCN'10, pp.36-53, 2010. ,
DOI : 10.1007/978-3-642-15317-4_3
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System, ISC 2005, pp.344-358, 2005. ,
DOI : 10.1007/11556992_25
Practical Deniable Encryption, Theory and Practice of Computer Science LNCS, vol.5805, pp.599-609, 2008. ,
DOI : 10.1007/978-3-540-77566-9_52
Parallel Key-Insulated Public Key Encryption Without Random Oracles, LNCS, vol.4450, pp.298-314, 2007. ,
DOI : 10.1007/978-3-540-71677-8_20
Time-release crypto. Manuscript, 1993. ,
Time-Specific Encryption, SCN'10, pp.1-16, 2010. ,
DOI : 10.1007/978-3-642-15317-4_1
Fuzzy Identity-Based Encryption, LNCS, vol.3494, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Why johnny can't encrypt: A usability evaluation of pgp 5.0, Proceedings of the 8th Conference on USENIX Security Symposium SSYM'99, pp.14-14, 1999. ,