1. Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M.: Tightly-secure signatures from lossy identification schemes. In: Pointcheval D., Johansson T. (eds.) EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, pp. 572–590. Springer, Heidelberg (2012).
2. Abe M., Groth J., Haralambiev K., Ohkubo M.: Optimal structure-preserving signatures in asymmetric bilinear groups. In: CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 649–666. Springer, Heidelberg (2011).
3. Barreto P.S.L.M., Lynn B., Scott M.: Constructing elliptic curves with prescribed embedding degrees. In: Cimato S., Galdi C., Persiano G. (eds.) SCN 2002. Lecture Notes in Computer Science, vol. 2576, pp. 257–267. Springer, Heidelberg (2003).
4. Bauer B., Fuchsbauer G., Loss J.: A classification of computational assumptions in the algebraic group model. In: Micciancio D., Ristenpart T. (eds.) CRYPTO 2020, Part II. Lecture Notes in Computer Science, vol. 12171, pp. 121–151. Springer, Heidelberg (2020).
5. Bellare M., Fuchsbauer G., Scafuro A.: Nizks with an untrusted CRS: security in the face of parameter subversion. In: Cheon J.H., Takagi T. (eds.) ASIACRYPT 2016, Part II. Lecture Notes in Computer Science, vol. 10032, pp. 777–804 (2016).