1. Efficient identity-based encryption with tight security reduction;Attrapadung;Lect. Notes Comput. Sci.,2006
2. The exact security of digital signatures: how to sign with RSA and Rabin;Bellare;Proc. EUROCRYPT’96,1996
3. Simulation without the artificial abort: simplified proof and improved concrete security for Waters’ IBE scheme;Bellare;Proc. EUROCRYPT’09,2009
4. Generic constructions of identity-based and certificateless KEMs;Bentahar;J. Cryptol.,2008
5. (Hierarchical) identity-based encryption from affine message authentication;Blazy;Proc. CRTPT’14,2014