1. Abe M, Gennaro R, Kurosawa K (2008) Tag-KEM/DEM: a new framework for hybrid encryption. J Cryptology 21(1):97–130
2. Bellare M, Jaeger J, Kane D (2015) Mass-surveillance without the state: strongly undetectable algorithm-substitution attacks. In: Ray I, Li N, Kruegel C (eds) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 Oct, 2015. ACM, pp 1431–1440
3. Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp 62–73
4. Boneh D, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. In: EUROCRYPT, pp 223–238
5. Boneh D, Katz J (2005) Improved Efficiency for CCA-secure cryptosystems built using identity-based encryption. In: CT-RSA, pp 87–103