G. Ateniese, J. Kirsch, and M. Blanton, Secret Handshakes with Dynamic and Fuzzy Matching, Network and Distributed System Security Symposium, 2007.

D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon et al., Secret handshakes from pairing-based key agreements, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.180-196, 2003.
DOI : 10.1109/SECPRI.2003.1199336

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.9132

M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, CRYPTO 1993, pp.232-249, 1993.
DOI : 10.1007/3-540-48329-2_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

I. Blake, G. Seroussi, N. Smart, and J. W. Cassels, Advances in Elliptic Curve Cryptography Lecture Note Series), 2005.

D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708

M. Burmester and Y. Desmedt, A secure and efficient conference key distribution system, EUROCRYPT 1994, pp.275-286, 1994.
DOI : 10.1007/BFb0053443

R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, EUROCRYPT 2001, pp.453-474, 2001.
DOI : 10.1007/3-540-44987-6_28

C. Castelluccia, S. Jarecki, and G. Tsudik, Secret Handshakes from CA-Oblivious Encryption, ASIACRYPT 2004, pp.293-307, 2004.
DOI : 10.1007/978-3-540-30539-2_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8848

C. Costello and D. Stebila, Fixed Argument Pairings, LATINCRYPT 2010, pp.92-108, 2010.
DOI : 10.1007/978-3-642-14712-8_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.8250

R. Dupont and A. Enge, Provably secure non-interactive key distribution based on pairings, Discrete Applied Mathematics, vol.154, issue.2, pp.270-276, 2006.
DOI : 10.1016/j.dam.2005.03.024

URL : https://hal.archives-ouvertes.fr/inria-00386311

S. Jarecki, J. Kim, and G. Tsudik, Authentication for Paranoids: Multi-party Secret Handshakes, 4th Intl. Conference on Applied Cryptography and Network Security, pp.325-339, 2006.
DOI : 10.1007/11767480_22

S. Jarecki, J. Kim, and G. Tsudik, Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement, CT-RSA 2007, pp.287-308, 2007.
DOI : 10.1007/11967668_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.9102

S. Jarecki, J. Kim, and G. Tsudik, Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange, CT-RSA 2008, pp.352-369, 2008.
DOI : 10.1007/978-3-540-79263-5_23

S. Jarecki and X. Liu, Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes, 5th Intl. Conference on Applied Cryptography and Network Security, pp.270-287, 2007.
DOI : 10.1007/978-3-540-72738-5_18

S. Jarecki and X. Liu, Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials, ICALP, pp.715-726, 2008.
DOI : 10.1007/978-3-540-70583-3_58

S. Jarecki and X. Liu, Private Mutual Authentication and Conditional Oblivious Transfer, CRYPTO 2009, pp.90-107, 2009.
DOI : 10.1007/978-3-642-03356-8_6

Y. Kawai, K. Yoneyama, and K. Ohta, Secret Handshake: Strong Anonymity Definition and Construction, 5th Intl. Conference on Information Security Practice and Experience, pp.219-229, 2009.
DOI : 10.1007/11506157_38

M. Manulis, B. Pinkas, and B. Poettering, Privacy-Preserving Group Discovery with Linear Complexity, 8th Intl. Conference on Applied Cryptography and Network Security, pp.420-437, 2010.
DOI : 10.1007/978-3-642-13708-2_25

M. Manulis and B. Poettering, Practical affiliation-hiding authentication from improved polynomial interpolation, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, 2011.
DOI : 10.1145/1966913.1966950

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.1861

M. Manulis, B. Poettering, and G. Tsudik, Affiliation-Hiding Key Exchange with Untrusted Group Authorities, 8th Intl. Conference on Applied Cryptography and Network Security, pp.402-419, 2010.
DOI : 10.1007/978-3-642-13708-2_24

M. Manulis, B. Poettering, and G. Tsudik, Taming Big Brother Ambitions: More Privacy for Secret Handshakes, 10th Intl. Workshop on Privacy Enhancing Technologies, pp.149-165, 2010.
DOI : 10.1007/978-3-642-14527-8_9

M. Scott, Computing the Tate Pairing, CT-RSA, pp.293-304, 2005.
DOI : 10.1007/978-3-540-30574-3_20

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO 1984, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf

M. Shigeo, A Fast Implementation of ?T Pairing in Characteristic Three on Intel Core 2 Duo Processor, Cryptology ePrint Archive Report, p.32, 2009.

G. Takahashi, F. Hoshino, and T. Kobayashi, Efficient GF (3 m ) Multiplication Algorithm for ?T Pairing, Cryptology ePrint Archive Report, vol.463, 2007.

G. Tsudik and S. Xu, A Flexible Framework for Secret Handshakes, 6th Intl. Workshop on Privacy Enhancing Technologies, pp.295-315, 2006.
DOI : 10.1007/11957454_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.5104

D. Vergnaud, RSA-Based Secret Handshakes, Intl. Workshop on Coding and Cryptography (WCC 2005), pp.252-274, 2005.
DOI : 10.1007/11779360_21

URL : https://hal.archives-ouvertes.fr/hal-00019353

S. Xu and M. Yung, -anonymous secret handshakes with reusable credentials, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.158-167, 2004.
DOI : 10.1145/1030083.1030105

URL : https://hal.archives-ouvertes.fr/jpa-00251144