1. Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. Proceedings of the 12th Annual Network and Distributed System Security Symposium 2005, San Diego, California, USA, 3-4 February. ACM, NewYork, pp 29–44
2. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Proceedings of EUROCRYPT 1998, Finland, 31 May 31 - 4 June. Springer-Verlag, Berlin, pp 127–144
3. Boneh D, Boyen X (2004) Efficient selective-ID based encryption without random oracles. Proceedings of EUROCRYPT 2004 Interlaken, Switzerland, 2-6 May. Springer-Verlag, Berlin, pp 223–238
4. Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant size ciphertext. Proceedings of Eurocrypt 2005, Aarhus, Denmarka, 22-26 May. Springer-Verlag, Berlin, pp 440– 456
5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. Proceedings of CRYPTO 2001, Santa Barbara, California, USA, 19-23 August. Springer-Verlag, Berlin, pp 231–229