1. Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie–Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001, pp. 143–158. Springer, Heidelberg (2001)
2. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE and extensions. In: Shoup, V. (ed.) CRYPTO 2005, pp. 205–222. Springer, Heidelberg (2005)
3. Ateniese, G., Fu, K.V., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)
4. Aviv, A.J., Locasto, M.E., Potter, S., Keromytis, A.D.: SSARES: secure searchable automated remote email storage. In: ACSAC 2007, pp. 129–139. IEEE (2007)
5. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., et al. (eds.) ICCSA 2008, pp. 1249–1259. Springer, Heidelberg (2008)