M. Abdalla, A. W. Dent, J. Malone-lee, G. Neven, D. H. Phan et al., Identity-Based Traitor Tracing, 10th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2007, pp.361-376, 2007.
DOI : 10.1007/978-3-540-71677-8_24

URL : https://hal.archives-ouvertes.fr/hal-00918560

S. S. Al-riyami and K. G. Paterson, Certificateless Public Key Cryptography, Lect. Notes Comput. Sci, vol.2894, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

M. H. Au, Q. Huang, J. K. Liu, W. Susilo, D. S. Wong et al., Traceable and Retrievable Identity-Based Encryption, Applied Cryptography and Network Security, pp.94-110, 2008.
DOI : 10.1007/978-3-540-68914-0_6

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles., in Cachin and Camenisch Secure Identity Based Encryption Without Random Oracles, pp.223-238

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, pp.440-456
DOI : 10.1007/11426639_26

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, and M. Hamburg, Space-Efficient Identity Based Encryption Without Pairings, Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007.

D. Boneh and J. Katz, Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, Lect. Notes Comput. Sci, vol.3376, pp.87-103, 2005.
DOI : 10.1007/978-3-540-30574-3_8

X. Boyen, Q. Mei, and B. Waters, Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.320-329, 2005.
DOI : 10.1145/1102120.1102162

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3538

X. Boyen and B. Waters, Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)., Advances in Cryptology -Crypto, pp.290-307, 2006.

R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme., in Biham Chosen-Ciphertext Security from Identity-Based Encryption, Cachin and Camenisch [13], pp.255-271

J. H. Cheon, Security Analysis of the Strong Diffie-Hellman Problem, Vaudenay [42], pp.1-11
DOI : 10.1007/11761679_1

C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Lect. Notes Comput. Sci, vol.2260, pp.360-363, 2001.
DOI : 10.1007/3-540-45325-3_32

R. Cramer, Advances in Cryptology -Eurocrypt, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005.

R. Cramer and V. Shoup, Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003.
DOI : 10.1137/S0097539702403773

M. K. Franklin, Advances in Cryptology -Crypto, 24th Annual International Cryptology Conference, 2004.

C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem., in Biham Practical Identity-Based Encryption Without Random Oracles, pp.272-293

C. Gentry, A. Silverberg, I. Hierarchical, and . Cryptography, Hierarchical ID-Based Cryptography, Lect. Notes Comput. Sci, vol.2501, pp.548-566, 2002.
DOI : 10.1007/3-540-36178-2_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270

V. Goyal, Reducing Trust in the PKG in Identity Based Cryptosystems, Menezes [32], pp.430-447
DOI : 10.1007/978-3-540-74143-5_24

V. Goyal, S. Lu, A. Sahai, and B. Waters, Black-box accountable authority identity-based encryption, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.427-436, 2008.
DOI : 10.1145/1455770.1455824

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

D. Hofheinz and E. Kiltz, Secure Hybrid Encryption from Weakened Key Encapsulation, Menezes [32], pp.553-571
DOI : 10.1007/978-3-540-74143-5_31

A. Kiayias and M. Yung, Traitor Tracing with Constant Transmission Rate, Lect. Notes Comput. Sci, vol.2332, pp.450-465, 2002.
DOI : 10.1007/3-540-46035-7_30

E. Kiltz, Y. Vahlis, and I. Secure, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Lect. Notes Comput. Sci, vol.4964, pp.221-238, 2008.
DOI : 10.1007/978-3-540-79263-5_14

K. Kurosawa and I. Desmedt, A New Paradigm of Hybrid Encryption Scheme, pp.426-442
DOI : 10.1007/978-3-540-28628-8_26

B. Libert and D. Vergnaud, Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, 2008.
DOI : 10.1007/978-3-642-00468-1_14

URL : https://hal.archives-ouvertes.fr/inria-00356999

A. Menezes, Advances in cryptology -crypto, 27th annual international cryptology conference, 2007.

D. Naccache, A. Shamir, and J. Stern, How to Copyright a Function?, 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, pp.188-196, 1999.
DOI : 10.1007/3-540-49162-7_14

T. Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Lect. Notes Comput. Sci, vol.740, pp.31-53, 1993.
DOI : 10.1007/3-540-48071-4_3

T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Lect. Notes Comput. Sci, vol.576, pp.129-140, 1992.
DOI : 10.1007/3-540-46766-1_9

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, pp.457-473
DOI : 10.1007/11426639_27

R. Sakai and M. Kasahara, ID based Cryptosystems with Pairing on Elliptic Curve, 2003.

P. Sarkar and S. Chatterjee, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Provable Security, First International Conference, pp.51-67, 2007.
DOI : 10.1007/978-3-540-75670-5_4

C. P. Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991.
DOI : 10.1007/BF00196725

URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Lect. Notes Comput. Sci, vol.196, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

V. Shoup and R. Gennaro, A Note on An Encryption Scheme of Kurosawa and Desmedt, 2004.

S. Vaudenay, Advances in Cryptology -Eurocrypt, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2006.

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, pp.114-127
DOI : 10.1007/11426639_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2190