1. A KEM/DEM-based construction for secure and anonymous communication;Emura,2015
2. Group signatures;Chaum,1991
3. Building key-private public-key encryption schemes;Paterson,2009
4. Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions;Abdalla;J Cryptology,2008
5. Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model;Libert,2012