1. Bellare, M., Goldwasser, S.: Encapsulated Key Escrow. MIT Laboratory for Computer Science Technical Report 688 (1996)
2. Bellare, M., Rogaway, P.: Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In: 1st ACM Conf. on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
3. Blake, I.F., Chan, A.C.-F.: Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. In: 25th IEEE Intl. Conf. on Distributed Computing Systems, pp. 504–513. IEEE Computer Society Press, Los Alamitos (2005)
4. Lecture Notes in Computer Science;D. Boneh,2004
5. Lecture Notes in Computer Science;D. Boneh,2004