Certificateless public key cryptography Advances in Cryptology -AsiaCrypt, LNCS, vol.2894, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
Identity-Based Encryption from the Weil pairing, Advances in Cryptology ? CRYPT01, pp.213-229, 2001. ,
Security proof of Sakai-Kasahar's identity-based encryption scheme, Proceedings of Cryptography and Coding, pp.442-459, 2005. ,
ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive Report, p.54, 2003. ,
Certificateless Encryption, Identity-Based Cryptography, pp.135-155, 2009. ,
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract, ASIACCS 2007, pp.273-283, 2007. ,
Certificate-Based Encryption and the Certificate Revocation Problem, Eurocrypt 2003, pp.272-293, 2003. ,
DOI : 10.1007/3-540-39200-9_17
Self-Generated-Certificate Public Key Encryption Without Pairing, PKC 2007, pp.476-489, 2007. ,
DOI : 10.1007/978-3-540-71677-8_31
A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures, EuroPKI 2009, pp.1-16, 2010. ,
DOI : 10.1007/978-3-642-16441-5_1
Certificateless Public Key Encryption Without Pairing, ISC 2005, pp.134-148, 2005. ,
DOI : 10.1007/11556992_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.3092
Constructing Efficient Certificate-based Encryption with Paring, Journal of Computers, vol.4, issue.1, 2009. ,
DOI : 10.4304/jcp.4.1.19-26
A new traitor tracing, IEICE Transactions, issue.2, pp.481-484, 2002. ,
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Proceedings of Advances in Cryptology ? Eurocrypt 2004, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
On the implementation of pairing-based cryptosystems, 2007. ,
An Efficient Signature Scheme from Bilinear Pairings and Its Applications, Public Key Cryptography ? PKC'04, pp.277-290, 2004. ,
DOI : 10.1007/978-3-540-24632-9_20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.8017
A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture, CISIM 2013, pp.178-193, 2013. ,
DOI : 10.1007/978-3-642-40925-7_19
URL : https://hal.archives-ouvertes.fr/hal-01496066
Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012. ,
DOI : 10.1007/978-3-642-33260-9_3