J. Baek and Y. Zheng, Identity-Based Threshold Decryption, pp.262-276
DOI : 10.1007/978-3-540-24632-9_19

A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, pp.31-46
DOI : 10.1007/3-540-36288-6_3

D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, CRYPTO 2001, pp.213-229, 2001.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, ASIACRYPT 2001, pp.514-532, 2001.

C. Boyd, P. Montague, and K. Q. Nguyen, Elliptic Curve Based Password Authenticated Key Exchange Protocols, ACISP 2001, pp.487-501, 2001.
DOI : 10.1007/3-540-47719-5_38

X. Boyen, Multipurpose identity-based signcryption (a swiss army knife for identity-based cryptography), CRYPTO 2003, pp.383-399, 2003.

E. Brier, J. Coron, T. Icart, D. Madore, H. Randriam et al., Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, CRYPTO 2010, pp.237-254, 2010.
DOI : 10.1007/978-3-642-14623-7_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.591.4859

J. C. Cha and J. H. Cheon, An identity-based signature from gap diffie-hellman groups, pp.18-30

R. R. Farashahi, P. Fouque, I. Shparlinski, M. Tibouchi, and F. Voloch, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Mathematics of Computation, vol.82, issue.281, 2010.
DOI : 10.1090/S0025-5718-2012-02606-8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.193.7713

D. M. Freeman and T. Satoh, Constructing pairing-friendly hyperelliptic curves using Weil restriction, Journal of Number Theory, vol.131, issue.5, 2009.
DOI : 10.1016/j.jnt.2010.06.003

URL : http://doi.org/10.1016/j.jnt.2010.06.003

E. Furukawa, M. Kawazoe, and T. Takahashi, Counting Points for Hyperelliptic Curves of Type??y 2=x 5+ax over Finite Prime Fields, SAC 2003, pp.26-41, 2003.
DOI : 10.1007/978-3-540-24654-1_3

C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, pp.548-566
DOI : 10.1007/3-540-36178-2_34

M. Haneda, M. Kawazoe, and T. Takahashi, Suitable curves for genus-4 HCC over prime fields, ICALP 2005, pp.539-550, 2005.

J. Horwitz and B. Lynn, Toward Hierarchical Identity-Based Encryption, EUROCRYPT 2002, pp.466-481, 2002.
DOI : 10.1007/3-540-46035-7_31

T. Icart, How to Hash into Elliptic Curves, CRYPTO 2009, pp.303-316, 2009.
DOI : 10.1007/978-3-642-03356-8_18

A. Joux, The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems, ANTS 2002, pp.20-32, 2002.
DOI : 10.1007/3-540-45455-1_3

J. Kammerer, R. Lercier, and G. Renault, Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time, p.1454, 1005.
DOI : 10.1007/978-3-642-17455-1_18

URL : https://hal.archives-ouvertes.fr/hal-00694136

M. Kawazoe and T. Takahashi, Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2???=???x 5???+???ax, Pairing 2008, pp.164-177, 2008.
DOI : 10.1007/978-3-540-85538-5_12

D. R. Kohel and I. Shparlinski, On Exponential Sums and Group Generators for Elliptic Curves over Finite Fields, ANTS 2000, pp.395-404, 2000.
DOI : 10.1007/10722028_24

B. Libert and J. Quisquater, Efficient signcryption with key privacy from gap diffiehellman groups, pp.187-200

A. J. Menezes, Y. Wu, and R. J. Zuccherato, An elementary introduction to hyperelliptic curves Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics, vol.3, pp.155-178, 1998.

T. Satoh, Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields, EUROCRYPT 2009, pp.536-553, 2010.
DOI : 10.1007/BF01272074

A. Shallue and C. Van-de-woestijne, Construction of Rational Points on Elliptic Curves over Finite Fields, ANTS 2006, pp.510-524, 2006.
DOI : 10.1007/11792086_36

M. Ulas, Rational Points on Certain Hyperelliptic Curves over Finite Fields, Bulletin of the Polish Academy of Sciences Mathematics, vol.55, issue.2, pp.97-104, 2007.
DOI : 10.4064/ba55-2-1

F. Zhang and K. Kim, ID-Based Blind Signature and Ring Signature from Pairings, pp.533-547
DOI : 10.1007/3-540-36178-2_33