Identity-Based Traitor Tracing, 10th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2007, pp.361-376, 2007. ,
DOI : 10.1007/978-3-540-71677-8_24
URL : https://hal.archives-ouvertes.fr/hal-00918560
Certificateless Public Key Cryptography, Lect. Notes Comput. Sci, vol.2894, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
Traceable and Retrievable Identity-Based Encryption, Applied Cryptography and Network Security, pp.94-110, 2008. ,
DOI : 10.1007/978-3-540-68914-0_6
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles., in Cachin and Camenisch Secure Identity Based Encryption Without Random Oracles, pp.223-238 ,
Hierarchical Identity Based Encryption with Constant Size Ciphertext, pp.440-456 ,
DOI : 10.1007/11426639_26
Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003. ,
DOI : 10.1137/S0097539701398521
Space-Efficient Identity Based Encryption Without Pairings, Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007. ,
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, Lect. Notes Comput. Sci, vol.3376, pp.87-103, 2005. ,
DOI : 10.1007/978-3-540-30574-3_8
Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.320-329, 2005. ,
DOI : 10.1145/1102120.1102162
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3538
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)., Advances in Cryptology -Crypto, pp.290-307, 2006. ,
A Forward-Secure Public-Key Encryption Scheme., in Biham Chosen-Ciphertext Security from Identity-Based Encryption, Cachin and Camenisch [13], pp.255-271 ,
Security Analysis of the Strong Diffie-Hellman Problem, Vaudenay [42], pp.1-11 ,
DOI : 10.1007/11761679_1
An Identity Based Encryption Scheme Based on Quadratic Residues, Lect. Notes Comput. Sci, vol.2260, pp.360-363, 2001. ,
DOI : 10.1007/3-540-45325-3_32
Advances in Cryptology -Eurocrypt, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005. ,
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003. ,
DOI : 10.1137/S0097539702403773
Advances in Cryptology -Crypto, 24th Annual International Cryptology Conference, 2004. ,
Certificate-Based Encryption and the Certificate Revocation Problem., in Biham Practical Identity-Based Encryption Without Random Oracles, pp.272-293 ,
Hierarchical ID-Based Cryptography, Lect. Notes Comput. Sci, vol.2501, pp.548-566, 2002. ,
DOI : 10.1007/3-540-36178-2_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270
Reducing Trust in the PKG in Identity Based Cryptosystems, Menezes [32], pp.430-447 ,
DOI : 10.1007/978-3-540-74143-5_24
Black-box accountable authority identity-based encryption, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.427-436, 2008. ,
DOI : 10.1145/1455770.1455824
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Secure Hybrid Encryption from Weakened Key Encapsulation, Menezes [32], pp.553-571 ,
DOI : 10.1007/978-3-540-74143-5_31
Traitor Tracing with Constant Transmission Rate, Lect. Notes Comput. Sci, vol.2332, pp.450-465, 2002. ,
DOI : 10.1007/3-540-46035-7_30
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Lect. Notes Comput. Sci, vol.4964, pp.221-238, 2008. ,
DOI : 10.1007/978-3-540-79263-5_14
A New Paradigm of Hybrid Encryption Scheme, pp.426-442 ,
DOI : 10.1007/978-3-540-28628-8_26
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, 2008. ,
DOI : 10.1007/978-3-642-00468-1_14
URL : https://hal.archives-ouvertes.fr/inria-00356999
Advances in cryptology -crypto, 27th annual international cryptology conference, 2007. ,
How to Copyright a Function?, 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, pp.188-196, 1999. ,
DOI : 10.1007/3-540-49162-7_14
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Lect. Notes Comput. Sci, vol.740, pp.31-53, 1993. ,
DOI : 10.1007/3-540-48071-4_3
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Lect. Notes Comput. Sci, vol.576, pp.129-140, 1992. ,
DOI : 10.1007/3-540-46766-1_9
Fuzzy Identity-Based Encryption, pp.457-473 ,
DOI : 10.1007/11426639_27
ID based Cryptosystems with Pairing on Elliptic Curve, 2003. ,
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Provable Security, First International Conference, pp.51-67, 2007. ,
DOI : 10.1007/978-3-540-75670-5_4
Efficient signature generation by smart cards, Journal of Cryptology, vol.4, issue.3, pp.161-174, 1991. ,
DOI : 10.1007/BF00196725
URL : http://publikationen.ub.uni-frankfurt.de/files/4280/schnorr.pdf
Identity-Based Cryptosystems and Signature Schemes, Lect. Notes Comput. Sci, vol.196, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
A Note on An Encryption Scheme of Kurosawa and Desmedt, 2004. ,
Advances in Cryptology -Eurocrypt, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2006. ,
Efficient Identity-Based Encryption Without Random Oracles, pp.114-127 ,
DOI : 10.1007/11426639_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2190