Fast digital identity revocation, Lect. Notes Comput. Sci, vol.1462, pp.137-152, 1998. ,
DOI : 10.1007/BFb0055725
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3886
Identity-Based Threshold Decryption, Bao et al. [3], pp.262-276 ,
DOI : 10.1007/978-3-540-24632-9_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878
Public Key Cryptography -PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Lect. Notes Comput. Sci, vol.2947, 2004. ,
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008. ,
DOI : 10.1145/1455770.1455823
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3047
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Cachin and Camenisch [15] Secure Identity Based Encryption Without Random Oracles., Advances in Cryptology -Crypto, pp.223-238 ,
DOI : 10.1007/978-3-540-24676-3_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446
A Method for Fast Revocation of Public Key Certificates and Security Capabilities, 10th USENIX Security Symposium USENIX Association, pp.297-310, 2001. ,
Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003. ,
DOI : 10.1137/S0097539701398521
Space-Efficient Identity Based Encryption Without Pairings, Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007. ,
Generalized Identity Based and Broadcast Encryption Schemes, Lect. Notes Comput. Sci, vol.20, issue.3, pp.455-470, 2008. ,
DOI : 10.1007/3-540-36178-2_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.644.9697
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, Lect. Notes Comput. Sci, vol.3376, pp.87-103, 2005. ,
DOI : 10.1007/978-3-540-30574-3_8
A tapestry of identity-based encryption: practical frameworks compared, International Journal of Applied Cryptography, vol.1, issue.1, pp.3-21, 2008. ,
DOI : 10.1504/IJACT.2008.017047
Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.320-329, 2005. ,
DOI : 10.1145/1102120.1102162
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3538
The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004. ,
DOI : 10.1145/1008731.1008734
A Forward-Secure Public-Key Encryption Scheme, Cachin and Camenisch [15], pp.255-271, 2003. ,
DOI : 10.1007/3-540-39200-9_16
Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.185-194, 2007. ,
DOI : 10.1145/1315245.1315269
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.3857
An Identity Based Encryption Scheme Based on Quadratic Residues, Lect. Notes Comput. Sci, vol.2260, pp.360-363, 2001. ,
DOI : 10.1007/3-540-45325-3_32
Advances in Cryptology -Eurocrypt, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005. ,
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003. ,
DOI : 10.1137/S0097539702403773
Simple Identity-Based Cryptography with Mediated RSA, Lect. Notes Comput. Sci, vol.2612, pp.193-210, 2003. ,
DOI : 10.1007/3-540-36563-X_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1770
QuasiModo: Efficient Certificate Validation and Revocation, Bao et al. [3], pp.375-388 ,
DOI : 10.1007/978-3-540-24632-9_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.6249
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption, Computational Science and Its Applications -ICCSA 2006, International Conference, pp.318-326, 2006. ,
DOI : 10.1007/11751595_35
Practical Identity-Based Encryption Without Random Oracles, Lect. Notes Comput. Sci, vol.4004, pp.445-464, 2006. ,
DOI : 10.1007/11761679_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.6168
Hierarchical ID-Based Cryptography, Lect. Notes Comput. Sci, vol.2501, pp.548-566, 2002. ,
DOI : 10.1007/3-540-36178-2_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270
Certificate Revocation Using Fine Grained Certificate Space Partitioning, 11th International Conference, pp.247-259, 2007. ,
DOI : 10.1007/978-3-540-77366-5_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5123
Toward Hierarchical Identity-Based Encryption, Lect. Notes Comput. Sci, vol.2332, pp.466-481, 2002. ,
DOI : 10.1007/3-540-46035-7_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.7591
Efficient revocation and threshold pairing based cryptosystems, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.163-171, 2003. ,
DOI : 10.1145/872035.872059
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, 12th International Workshop on Practice and Theory in Public Key Cryptography, pp.235-255, 2000. ,
DOI : 10.1007/978-3-642-00468-1_14
URL : https://hal.archives-ouvertes.fr/inria-00356999
Efficient Certificate Revocation, Novomodo: Scalable Certificate Validation and Simplified PKI Management., 1st Annual PKI Research Workshop (S. Smith NIST, pp.15-25, 1996. ,
Fuzzy Identity-Based Encryption, Cramer [21], pp.457-473 ,
DOI : 10.1007/11426639_27
Identity-Based Cryptosystems and Signature Schemes, Lect. Notes Comput. Sci, vol.196, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
Efficient Identity-Based Encryption Without Random Oracles, pp.114-127 ,
DOI : 10.1007/11426639_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2190