A study of pair encodings: Predicate encryption in prime order groups, 2016. ,
A Framework for Identity-Based Encryption with Almost Tight Security, 2003. ,
DOI : 10.1007/978-3-662-48797-6_22
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, EUROCRYPT 2014, 2014. ,
DOI : 10.1007/978-3-642-55220-5_31
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
Secure Identity Based Encryption Without Random Oracles, 2004. ,
DOI : 10.1007/978-3-540-28628-8_27
URL : http://theory.stanford.edu/~dabo/abstracts/../papers/sibewro.pdf
Identity-based encryption from the weil pairing, 2001. ,
DOI : 10.1137/s0097539701398521
URL : http://eprint.iacr.org/2001/090.ps.gz
Evaluating 2-DNF Formulas on Ciphertexts, TCC 2005, pp.8-14, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
(Hierarchical) Identity-Based Encryption from Affine Message Authentication, 2002. ,
DOI : 10.1007/978-3-662-44371-2_23
URL : https://hal.archives-ouvertes.fr/hal-01239920
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, 0793. ,
DOI : 10.1007/978-3-642-03356-8_36
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993. ,
DOI : 10.1145/168588.168596
Identity-Based Encryption Secure against Selective Opening Attack, 2008. ,
DOI : 10.1007/978-3-642-19571-6_15
URL : http://eprint.iacr.org/2010/159.pdf
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, EUROCRYPT 2015, 2015. ,
DOI : 10.1007/978-3-662-46803-6_20
URL : https://hal.archives-ouvertes.fr/hal-01220358
Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, SCN 2016, 2016. ,
DOI : 10.1007/978-3-642-54631-0_16
URL : https://hal.archives-ouvertes.fr/hal-01309562
D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, EUROCRYPT 2014, p.7, 2014. ,
DOI : 10.1007/978-3-642-55220-5_34
URL : http://cseweb.ucsd.edu/~smeiklejohn/files/eurocrypt14a.pdf
D??j?? Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, 0713. ,
DOI : 10.1007/978-3-662-49099-0_9
Fully, (Almost) Tightly Secure IBE and Dual System Groups, 2007. ,
DOI : 10.1007/978-3-642-40084-1_25
Extended Nested Dual System Groups, Revisited, PKC 2016, 2016. ,
DOI : 10.1007/978-3-662-49384-7_6
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, ASIACRYPT 2016, 2016. ,
DOI : 10.1007/978-3-642-54242-8_26
Practical Identity-Based Encryption Without Random Oracles, EUROCRYPT 2006, 2006. ,
DOI : 10.1007/11426639_7
URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2330/2330.pdf
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting, PKC 2015, p.17, 2015. ,
DOI : 10.1007/978-3-662-46447-2_36
Adaptive partitioning. IACR Cryptology ePrint Archive, 2016. ,
Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography, TCC 2016, 2016. ,
DOI : 10.1007/11426639_7
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, 0716. ,
DOI : 10.1007/978-3-642-13190-5_4
URL : http://eprint.iacr.org/2010/110.pdf
Functional commitment schemes: From polynomial commitments to pairing-based accumulators from simple assumptions, ICALP 2016, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01306152
Number-theoretic constructions of efficient pseudo-random functions, Journal of the ACM, vol.51, issue.2, pp.231-262, 2004. ,
DOI : 10.1145/972639.972643
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, 2010. ,
DOI : 10.1007/978-3-642-14623-7_11
URL : https://eprint.iacr.org/2010/563.pdf
Identity-Based Cryptosystems and Signature Schemes, CRYPTO 84, 1984. ,
DOI : 10.1007/3-540-39568-7_5
URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf
Efficient Identity-Based Encryption Without Random Oracles, EUROCRYPT 2005, 2005. ,
DOI : 10.1007/11426639_7
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, 2004. ,
DOI : 10.1007/978-3-642-03356-8_36
URL : http://eprint.iacr.org/2009/385.pdf
D??j?? Q: Encore! Un Petit IBE, 2009. ,
DOI : 10.1007/978-3-642-54242-8_26