S. Al-riyami and K. Paterson, Certificateless public key cryptography Advances in Cryptology -AsiaCrypt, LNCS, vol.2894, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil pairing, Advances in Cryptology ? CRYPT01, pp.213-229, 2001.

L. Chen and Z. Cheng, Security proof of Sakai-Kasahar's identity-based encryption scheme, Proceedings of Cryptography and Coding, pp.442-459, 2005.

R. Sakai and M. Kasahara, ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive Report, p.54, 2003.

S. Chow, S. , and M. , Certificateless Encryption, Identity-Based Cryptography, pp.135-155, 2009.

J. Liu, K. Au, M. , H. Susilo, and W. , Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract, ASIACCS 2007, pp.273-283, 2007.

G. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, Eurocrypt 2003, pp.272-293, 2003.
DOI : 10.1007/3-540-39200-9_17

J. Lai and K. Kou, Self-Generated-Certificate Public Key Encryption Without Pairing, PKC 2007, pp.476-489, 2007.
DOI : 10.1007/978-3-540-71677-8_31

A. Dent and W. , A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures, EuroPKI 2009, pp.1-16, 2010.
DOI : 10.1007/978-3-642-16441-5_1

J. Baek, R. Safavi-naini, and W. Susilo, Certificateless Public Key Encryption Without Pairing, ISC 2005, pp.134-148, 2005.
DOI : 10.1007/11556992_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092

Y. Lu and J. Li, Constructing Efficient Certificate-based Encryption with Paring, Journal of Computers, vol.4, issue.1, 2009.
DOI : 10.4304/jcp.4.1.19-26

S. Mitsunari, R. Sakai, and M. Kasahara, A new traitor tracing, IEICE Transactions, issue.2, pp.481-484, 2002.

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Proceedings of Advances in Cryptology ? Eurocrypt 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

B. Lynn, On the implementation of pairing-based cryptosystems, 2007.

F. Zhang, R. Safavi-naini, and W. Susilo, An Efficient Signature Scheme from Bilinear Pairings and Its Applications, Public Key Cryptography ? PKC'04, pp.277-290, 2004.
DOI : 10.1007/978-3-540-24632-9_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.8017

T. Hyla and J. Peja?, A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture, CISIM 2013, pp.178-193, 2013.
DOI : 10.1007/978-3-642-40925-7_19

URL : https://hal.archives-ouvertes.fr/hal-01496066

T. Hyla and J. Peja?, Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012.
DOI : 10.1007/978-3-642-33260-9_3