1. Boyd, C. (1997). On key agreement and conference key agreement. In Australasian conference on information security and privacy (pp. 294–302). Springer.
2. Gorantla, M. C., Boyd, C., González, N., & Juan, M. (2010). Attribute-based authenticated key exchange. In R. Steinfeld & P. Hawkes (Eds.), Information security and privacy (pp. 300–317). Heidelberg: Springer.
3. Steinwandt, R., & Corona, A. (2010). Attribute-based group key establishment. IACR Cryptology ePrint Archive, 235(08), 2010.
4. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security, CCS’06 (pp. 89–98). New York: ACM.
5. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology—EUROCRYPT 2005, volume 3494 of lecture notes in computer science (pp. 457–473). Berlin: Springer.