1. Anderson, R.: Two remarks on public-key cryptology. Invited Lecture. In: ACMCCCS 1997 (1997), Available at
http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf
2. Lecture Notes in Computer Science;M. Bellare,1999
3. Bellare, M., Palacio, A.: Protecting against key exposure: strongly keyinsulated encryption with optimal threshold, Available at
http://eprint.iacr.org
4. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. Advances in Cryptology — Crypto 2001, LNCS vol. 2139, Springer-Verlag (2001), Full version to appear in SIAM J. Computing and available at
http://eprint.iacr.org/2001/090
5. Lecture Notes in Computer Science;R. Canetti,2003