References
- M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," Advances in Cryptology - Eurocrypt' 98, LNCS 1403, pp. 127-144, 1998.
- G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," Cryptography ePrint Archive, Report 2005/028, 2005.
- R. Canetti and S. Hohenberger, "Chosen-ci-phertext secure proxy re-encryption," Cryptography ePrint Archive, Report 2007/171, 2007.
- M. Green and G. Ateniese, "Identity-based proxy re-encryption," Cryptography ePrint Archive, Report 2006/473, 2006.
- S. S. Al-Riyami and K. Paterson, "Certificate-less public key cryptography," Advances in Cryptology - Asiacrypt 2003, LNCS 2894, pp. 452-473, 2003.
- S. S. Al-Riyami and K. Paterson, "CBE from CL-PKE: A generic construction and efficient scheme," Public Key Cryptography - PKC 2005, LNCS 3386, pp. 398-415, 2005.
- B. Libert and J. Quisquater, "On constructing certificateless cryptosystem from identity based encryption," Public Key Cryptography - PKC 2006, LNCS 3958, pp. 474-490, 2006.
- J. H. Park, K. Y. Choi, J. Y. Hwang, and D. H. Lee, "Certificateless public key encryption in the selective-id security model," Pairing 2007, LNCS 4575, pp. 60-82, 2007.
- D. Boneh and X. Boyen, "Efficient selective-id secure identity based encryption without random oracles," Advances in Cryptology - Eurocrypt 2004, LNCS 3027, pp. 223-238, 2004.
- R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," Advances in Cryptology - Eurocrypt 2003, LNCS 2656, pp. 255-271, 2003.
- D. Boneh and M. Franklin, "Identity-based encryption from the weil paring," Advances in Cryptology - Crypto 2001, LNCS 2139, pp. 213-229, 2001.
- L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," Cryptography ePrint Archive, Report 2002/184, 2002.
- M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," ACM CCS' 93, pp. 62-73, 1993.
- E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Advances in Cryptology - Crypto' 99, LNCS 1666, pp. 535-554, 1999.