1. J. Baek, Y. Zheng, Identity-based threshold decryption, in: Proceedings of Pkc’04, Lecture Notes in Computer Science, vol. 2947, pp. 262–276, 2004.
2. D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in: Advances in Cryptology, Crypto’01, Lecture Notes in Computer Science, vol. 2193, pp. 213–229, 2001.
3. D. Boneh, X. Franklin, Efficient selective-id secure identity based encryption without random oracles, in: Advances in Cryptology, Eurocrypt’04, Lecture Notes in Computer Science, vol. 2260, pp. 360–363, 2004.
4. D. Boneh, B. Lynn, H. Shacham, Short signatures from the weil pairings, in: Advances in Cryptology, Asiacrypt’01, Lecture Notes in Computer Science, vol. 2248, pp. 514–532, 2002.
5. Z. Chai, Z. Cao, R. Lu, ID-based threshold decryption without random oracles and its applications in key escrow, in: Proceedings of International Conference on Information Security, ACM, pp. 119–124, 2004.