W. Aiello, S. Lodha, and R. Ostrovsky, Fast digital identity revocation, Lect. Notes Comput. Sci, vol.1462, pp.137-152, 1998.
DOI : 10.1007/BFb0055725

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.3886

J. Baek and Y. Zheng, Identity-Based Threshold Decryption, Bao et al. [3], pp.262-276
DOI : 10.1007/978-3-540-24632-9_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878

F. Bao and R. H. Deng, Public Key Cryptography -PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Lect. Notes Comput. Sci, vol.2947, 2004.

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

A. Boldyreva, V. Goyal, and V. Kumar, Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008.
DOI : 10.1145/1455770.1455823

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3047

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Cachin and Camenisch [15] Secure Identity Based Encryption Without Random Oracles., Advances in Cryptology -Crypto, pp.223-238
DOI : 10.1007/978-3-540-24676-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446

D. Boneh, X. Ding, G. Tsudik, and C. M. Wong, A Method for Fast Revocation of Public Key Certificates and Security Capabilities, 10th USENIX Security Symposium USENIX Association, pp.297-310, 2001.

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, and M. Hamburg, Space-Efficient Identity Based Encryption Without Pairings, Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pp.647-657, 2007.

D. Boneh and M. Hamburg, Generalized Identity Based and Broadcast Encryption Schemes, Lect. Notes Comput. Sci, vol.20, issue.3, pp.455-470, 2008.
DOI : 10.1007/3-540-36178-2_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.644.9697

D. Boneh and J. Katz, Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption, Lect. Notes Comput. Sci, vol.3376, pp.87-103, 2005.
DOI : 10.1007/978-3-540-30574-3_8

X. Boyen, A tapestry of identity-based encryption: practical frameworks compared, International Journal of Applied Cryptography, vol.1, issue.1, pp.3-21, 2008.
DOI : 10.1504/IJACT.2008.017047

X. Boyen, Q. Mei, and B. Waters, Direct chosen ciphertext security from identity-based techniques, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.320-329, 2005.
DOI : 10.1145/1102120.1102162

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3538

R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, Journal of the ACM, vol.51, issue.4, pp.557-594, 2004.
DOI : 10.1145/1008731.1008734

R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Cachin and Camenisch [15], pp.255-271, 2003.
DOI : 10.1007/3-540-39200-9_16

R. Canetti and S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.185-194, 2007.
DOI : 10.1145/1315245.1315269

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.3857

C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Lect. Notes Comput. Sci, vol.2260, pp.360-363, 2001.
DOI : 10.1007/3-540-45325-3_32

R. Cramer, Advances in Cryptology -Eurocrypt, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2005.

R. Cramer and V. Shoup, Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2003.
DOI : 10.1137/S0097539702403773

X. Ding and G. Tsudik, Simple Identity-Based Cryptography with Mediated RSA, Lect. Notes Comput. Sci, vol.2612, pp.193-210, 2003.
DOI : 10.1007/3-540-36563-X_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1770

F. F. Elwailly, C. Gentry, and R. Z. , QuasiModo: Efficient Certificate Validation and Revocation, Bao et al. [3], pp.375-388
DOI : 10.1007/978-3-540-24632-9_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.6249

D. Galindo, A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption, Computational Science and Its Applications -ICCSA 2006, International Conference, pp.318-326, 2006.
DOI : 10.1007/11751595_35

C. Gentry, Practical Identity-Based Encryption Without Random Oracles, Lect. Notes Comput. Sci, vol.4004, pp.445-464, 2006.
DOI : 10.1007/11761679_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.6168

C. Gentry, A. Silverberg, I. Hierarchical, and . Cryptography, Hierarchical ID-Based Cryptography, Lect. Notes Comput. Sci, vol.2501, pp.548-566, 2002.
DOI : 10.1007/3-540-36178-2_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270

V. Goyal, Certificate Revocation Using Fine Grained Certificate Space Partitioning, 11th International Conference, pp.247-259, 2007.
DOI : 10.1007/978-3-540-77366-5_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5123

J. Horwitz and B. Lynn, Toward Hierarchical Identity-Based Encryption, Lect. Notes Comput. Sci, vol.2332, pp.466-481, 2002.
DOI : 10.1007/3-540-46035-7_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.7591

B. Libert and J. Quisquater, Efficient revocation and threshold pairing based cryptosystems, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.163-171, 2003.
DOI : 10.1145/872035.872059

B. Libert and D. Vergnaud, Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, 12th International Workshop on Practice and Theory in Public Key Cryptography, pp.235-255, 2000.
DOI : 10.1007/978-3-642-00468-1_14

URL : https://hal.archives-ouvertes.fr/inria-00356999

S. Micali, M. /. Lcs, and . Tm, Efficient Certificate Revocation, Novomodo: Scalable Certificate Validation and Simplified PKI Management., 1st Annual PKI Research Workshop (S. Smith NIST, pp.15-25, 1996.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Cramer [21], pp.457-473
DOI : 10.1007/11426639_27

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Lect. Notes Comput. Sci, vol.196, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, pp.114-127
DOI : 10.1007/11426639_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2190