D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

J. Cha and J. Cheon, Identity-based signature from gap Diffie-Hellman groups, Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography(PKC 2003), pp.18-30, 2003.

R. Dupont and A. Enge, Provably secure non-interactive key distribution based on pairings, Discrete Applied Mathematics, vol.154, issue.2, pp.270-276, 2006.
DOI : 10.1016/j.dam.2005.03.024

URL : https://hal.archives-ouvertes.fr/inria-00386311

J. Jeong, S. Guo, Y. Gu, T. He, and D. H. Du, Trajectory-Based Data Forwarding for Light-Traffic Vehicular Ad Hoc Networks, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.5, pp.743-757, 2011.
DOI : 10.1109/TPDS.2010.103

A. Kate, G. M. Zaverucha, and I. Goldberg, Pairing-Based Onion Routing with Improved Forward Secrecy, ACM Transactions on Information and System Security, vol.13, issue.4, 2010.
DOI : 10.1145/1880022.1880023

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2336

X. Lin, R. Lu, X. Liang, and X. Shen, STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs, 2011 Proceedings IEEE INFOCOM, pp.2147-2155, 2011.
DOI : 10.1109/INFCOM.2011.5935026

R. Lu, X. X. Lin, X. Liang, . Sherman, and . Shen, Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-5, 2010.
DOI : 10.1109/GLOCOM.2010.5683313

R. Lu, X. Lin, and X. Shen, SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks, 2010 Proceedings IEEE INFOCOM, pp.632-640, 2010.
DOI : 10.1109/INFCOM.2010.5462161

R. Lu, X. Lin, H. Zhu, P. Ho, and X. Shen, ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1229-1237, 2008.
DOI : 10.1109/INFOCOM.2008.179

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.564.4866

J. Nzouonta, N. Rajgure, G. Wang, and C. Borcea, VANET Routing on City Roads Using Real-Time Vehicular Traffic Information, IEEE Transactions on Vehicular Technology, vol.58, issue.7, pp.3609-3626, 2009.
DOI : 10.1109/TVT.2009.2014455

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.6379

M. Raya and J. Hubaux, Securing vehicular ad hoc networks, Journal of Computer Security, vol.15, issue.1, pp.39-68, 2007.
DOI : 10.3233/JCS-2007-15103

R. Sakai, K. Ohgishi, and M. Kasahara, Cryptosystems based on pairing, Symposium on Cryptography and Information Security, 2000.

J. Zhao and G. Cao, VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006.
DOI : 10.1109/INFOCOM.2006.298