1. [1] R. Sakai, K. Ohgishi, and M. Kasahara, “Cryptosystems based on pairings,” SCIS2000, pp.26-28, 2000.
2. [2] K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis, and G. Stephanides, “Mathematical problems and algorithms for timed-release encryption,” Bulletin of the Transilvania University of Brasov, vol.15, no.50, pp.1-4, 2008.
3. [3] T. Nakanishi and N. Funabiki, “Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps,” ASIACRYPT 2005, LNCS 3788, pp.533-548, Springer, 2005.
4. [4] N. Begum, T. Nakanishi, and N. Funabiki, “Efficient proofs for CNF formulas on attributes in pairing-based anonymous credential system,” IEICE Trans. Fundamentals, vol.96-A, no.12, pp.2422-2433, Dec. 2013.
5. [5] R. Bendlin, I. Damgård, C. Orlandi, and S. Zakarias, “Semi-homomorphic encryption and multiparty computation,” EUROCRYPT'11, LNCS 6632, pp.169-188, Springer, 2011.