1. Two remarks on public key cryptology;Anderson,1997
2. Tightly-secure authenticated key exchange;Bader,2015
3. Security proofs for identity-based identification and signature schemes;Bellare,2004
4. Tightly-secure signatures from chameleon hash functions;Blazy,2015
5. Efficient selective-id secure identity-based encryption without random oracles;Boneh,2004