1. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H., Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3):350–391, 2008.
2. Abdalla, M., Bellare, M., and Neven, G.: Robust encryption. In: TCC, pp. 480–497, 2010
3. Abdalla, M., Bellare, M., and Neven, G., Robust encryption. J. Cryptol. 31(2):307–350, 2018.
4. Baek, J., Safavi-Naini, R., and Susilo, W.: On the integration of public key data encryption and public key encryption with keyword search. In: ISC, pp. 217–232, 2006
5. Bellare, M., and Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73, 1993