M. Abdalla, M. Bellare, and P. Rogaway, DHIES: an encryption scheme based on the Diffie-Hellman problem, 1998.

M. Bellare, A. Boldyreva, and S. Micali, Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, LNCS, vol.1807, pp.259-274, 2000.
DOI : 10.1007/3-540-45539-6_18

I. F. Blake and A. C. Chan, Scalable, server-passive, user-anonymous timed release public key encryption from bilinear pairing, ICDS, 2005.

D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001.

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, LNCS, vol.6597, pp.253-273, 2011.
DOI : 10.1007/978-3-642-19571-6_16

X. Bultel and P. Lafourcade, A Posteriori Openable Public Key Encryption, 2015.
DOI : 10.1007/978-3-319-33630-5_2

URL : https://hal.archives-ouvertes.fr/hal-01369535

R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, Deniable Encryption, CRYPTO'97, pp.90-104, 1997.
DOI : 10.1007/BFb0052229

J. Cathalo, B. Libert, and J. Quisquater, Efficient and non-interactive timedrelease encryption, ICICS 05, pp.291-303, 2005.

J. H. Cheon, N. Hopper, Y. Kim, and I. Osipkov, Timed-Release and Key-Insulated Public Key Encryption, LNCS, vol.4107, pp.191-205, 2006.
DOI : 10.1007/11889663_17

R. Cramer and V. Shoup, Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003.
DOI : 10.1137/S0097539702403773

A. W. Dent and Q. Tang, Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability, LNCS, vol.4779, pp.158-174, 2007.
DOI : 10.1007/978-3-540-75496-1_11

Y. Dodis, J. Katz, S. Xu, and M. Yung, Key-Insulated Public Key Cryptosystems, EUROCRYPT 2002, pp.65-82, 2002.
DOI : 10.1007/3-540-46035-7_5

E. Fujisaki and T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, Journal of Cryptology, vol.14, issue.1, pp.80-101, 2013.
DOI : 10.1007/s00145-011-9114-1

D. Galindoa and J. Herranz, On the security of public key cryptosystems with a double decryption mechanism, Information Processing Letters, vol.108, issue.5, pp.279-283, 2008.
DOI : 10.1016/j.ipl.2008.05.017

O. Goldreich, B. Pfitzmann, and R. L. Rivest, Self-delegation with controlled propagation ??? or ??? What if you lose your laptop, CRYPTO'98, pp.153-168, 1998.
DOI : 10.1007/BFb0055726

S. Goldwasser, Y. T. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zeldovich, How to Run Turing Machines on Encrypted Data, CRYPTO 2013, pp.536-553, 2013.
DOI : 10.1007/978-3-642-40084-1_30

S. Goldwasser, Y. T. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zeldovich, Reusable garbled circuits and succinct functional encryption, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.555-564, 2013.
DOI : 10.1145/2488608.2488678

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

G. Hanaoka and J. Weng, Generic Constructions of Parallel Key-Insulated Encryption, SCN'10, pp.36-53, 2010.
DOI : 10.1007/978-3-642-15317-4_3

Y. H. Hwang, D. H. Yum, and P. J. Lee, Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System, ISC 2005, pp.344-358, 2005.
DOI : 10.1007/11556992_25

M. Klonowski, P. Kubiak, and M. Kutyy-lowski, Practical Deniable Encryption, Theory and Practice of Computer Science LNCS, vol.5805, pp.599-609, 2008.
DOI : 10.1007/978-3-540-77566-9_52

B. Libert, J. Quisquater, and M. Yung, Parallel Key-Insulated Public Key Encryption Without Random Oracles, LNCS, vol.4450, pp.298-314, 2007.
DOI : 10.1007/978-3-540-71677-8_20

T. May, Time-release crypto. Manuscript, 1993.

K. G. Paterson and E. A. Quaglia, Time-Specific Encryption, SCN'10, pp.1-16, 2010.
DOI : 10.1007/978-3-642-15317-4_1

A. Sahai and B. R. Waters, Fuzzy Identity-Based Encryption, LNCS, vol.3494, pp.457-473, 2005.
DOI : 10.1007/11426639_27

A. Whitten and J. D. Tygar, Why johnny can't encrypt: A usability evaluation of pgp 5.0, Proceedings of the 8th Conference on USENIX Security Symposium SSYM'99, pp.14-14, 1999.