S. Mitsunari, R. Sakai, and M. Kasahara, A new traitor tracing, IEICE Transations, issue.2, pp.481-484, 2002.

L. Chen and Z. Cheng, Security Proof of Sakai-Kasahara???s Identity-Based Encryption Scheme, Cryptography and Coding: 10th IMA International Conference Proceedings. pp, pp.442-459, 2005.
DOI : 10.1007/11586821_29

R. Sakai and M. Kasahara, ID based Cryptosystems with Pairing on Elliptic Curve, p.54, 2003.

F. Zhang, R. Safavi-naini, and W. Susilo, An Efficient Signature Scheme from Bilinear Pairings and Its Applications Public Key Cryptography --PKC, pp.277-290, 2004.

P. S. Barreto, B. Libert, N. Mccullagh, and J. Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps, Advances in Cryptology -ASIACRYPT 2005, pp.515-532, 2005.
DOI : 10.1007/11593447_28

URL : http://www.dice.ucl.ac.be/crypto/files/publications/ps247.ps

B. C. Hu, D. S. Wong, Z. Zhang, and X. Deng, Certificateless signature: a new security model and an improved generic construction, Designs, Codes and Cryptography, vol.17, issue.2, pp.109-126, 2007.
DOI : 10.1007/s10623-006-9022-9

H. Du and Q. Wen, An Efficient Identity-Based Short Signature Scheme from Bilinear Pairings, 2007 International Conference on Computational Intelligence and Security (CIS 2007), pp.725-729, 2007.
DOI : 10.1109/CIS.2007.168

S. S. Al-riyami and K. G. Paterson, Certificateless Public Key Cryptography, Advances in Cryptology ? ASIACRYPT 2003, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://eprint.iacr.org/2003/126.ps.gz

M. Girault, Self-certified public keys Advances in Cryptology --- EUROCRYPT '91, pp.490-497, 1991.

H. Du and Q. Wen, Efficient and provably-secure certificateless short signature scheme from bilinear pairings, Computer Standards & Interfaces, vol.31, issue.2, pp.390-394, 2009.
DOI : 10.1016/j.csi.2008.05.013

X. Huang, W. Susilo, Y. Mu, and F. Zhang, On the Security of Certificateless Signature Schemes from Asiacrypt, CANS 2005, pp.13-25, 2003.

X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, Certificateless Signatures: New Schemes and Security Models, The Computer Journal, vol.55, issue.4, pp.457-474, 2011.
DOI : 10.1093/comjnl/bxr097

G. Kang, J. H. Park, and S. G. , Hahn A Certificate-based Signature Scheme, CT-RSA 2004, pp.99-111, 2004.

J. Li, X. Huang, Y. Mu, W. Susilo, and Q. Wu, Certificate-Based Signature: Security Model and Efficient Construction, EuroPKI 2007, pp.110-125, 2007.
DOI : 10.1007/978-3-540-73408-6_8

Y. Hung, S. Huang, and Y. Tseng, A Short Certificate-based Signature Scheme with Provable Security, Information Technology And Control, vol.45, issue.3, pp.243-253, 2015.
DOI : 10.5755/j01.itc.45.3.12814

W. Wu, Y. Mu, W. Susilo, and X. Huang, Certificate-based Signatures Revisited, Journal of Universal Computer Science, vol.15, issue.8, pp.1659-1684, 2009.

J. K. Liu, F. Bao, and J. Zhou, Short and Efficient Certificate-Based Signature, pp.167-178, 2011.
DOI : 10.1007/978-3-642-23041-7_17

URL : https://hal.archives-ouvertes.fr/hal-01587839

L. Cheng, Y. Xiao, and G. Wang, Cryptanalysis of a Certificate-Based on Signature Scheme, Procedia Engineering, vol.29, pp.2821-2825, 2012.
DOI : 10.1016/j.proeng.2012.01.397

T. Hyla, W. Ma?ków, and J. Peja?, Implicit and Explicit Certificates-Based Encryption Scheme, CISIM 2014, pp.651-666, 2014.
DOI : 10.1007/978-3-642-33260-9_3

URL : https://hal.archives-ouvertes.fr/hal-01405660

T. Hyla and J. Peja?, A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates, The Computer Journal, 2016.
DOI : 10.1093/comjnl/bxw052

T. Hyla and J. Peja?, Non-standard Certification Models for Pairing Based Cryptography, Hard and Soft Computing for Artificial Intelligence, Multimedia and Security, pp.167-181, 2017.
DOI : 10.1007/1-4020-8143-X_11

S. H. Islam and G. P. Biswas, An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings, Theoretical and Applied Informatics, pp.109-118, 2012.
DOI : 10.2478/v10179-012-0009-0

A. Boldyreva, A. Palacio, and B. Warinschi, Secure Proxy Signature Schemes for Delegation of??Signing??Rights, Journal of Cryptology, vol.22, issue.8, pp.57-115, 2012.
DOI : 10.1109/RISP.1991.130793

J. Li, X. Huang, Y. Zhang, and L. Xu, An efficient short certificate-based signature scheme, Journal of Systems and Software, vol.85, issue.2, pp.314-322, 2012.
DOI : 10.1016/j.jss.2011.08.014