1. Boneh, D., and Franklin, M. (2001). Annual International Cryptology Conference, Proceedings of the CRYPTO 2001, Santa Barbara, CA, USA, 19–23 August 2001, Springer.
2. Sakai, R. (2001, January 22–25). Cryptosystems based on pairing over elliptic curve. Proceedings of the Symposium on Cryptography and Information Security-SCIS’01, Orlando, FL, USA.
3. Cocks, C. (2001, January 17–19). An identity based encryption scheme based on quadratic residues. Proceedings of the Cryptography and Coding: 8th IMA International Conference, Cirencester, UK. Proceedings 8.
4. Waters, B. (2005, January 22–26). Efficient identity-based encryption without random oracles. Proceedings of the Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark. Proceedings 24.
5. Afroaz, K., Rao, Y.S., and Rukma, R.N. (2022, January 23–24). A Key Escrow Free Anonymous Identity Based Encryption Scheme Using Ring Signatures. Proceedings of the 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT), Indore, India.