1. 1) Abdalla, M., An, J. H., Bellare, M., and Namprempre, C., ``From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security,'' LNCS, 2332: 418-433 (2002).
2. 2) Abdalla, M., Ben Hamouda, F., and Pointcheval, D., ``Tighter reductions for forward-secure signature schemes,'' LNCS, 7778: 292-311 (2013).
3. 3) Abdalla, M., Fouque, P. A., Lyubashevsky, V., and Tibouchi, M., ``Tightly-secure signatures from lossy identification schemes,'' LNCS, 7237: 572-590 (2012).
4. 4) Boneh, D., Goh, E. J., and Nissim, K., ``Evaluating 2-DNF formulas on ciphertexts,'' LNCS, 3378: 325-341 (2005).
5. 5) Bellare, M., and Rogaway, P., ``Random oracles are practical: A paradigm for designing efficient protocols,'' ACM CCS 1993, 62-73 (1993).