1. [1] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Pallier, and H. Shi, “Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, ” Crypto'05, vol.3621 of LNCS, pp.205-222, Springer, 2005.
2. [2] M. Abe, R. Gennaro, and K. Kurosawa, “Tag-KEM/DEM: A new framework for hybrid encryption, ” Cryptology ePrint Archive, http://eprint.iacr.org/2005/027/, 2005.
3. [3] J. Baek, R. Safavi-Naini, and W. Susilo, “On the integration of public key data encryption and public key encryption with keyword search, ” ISC'06, vol.4176 of LNCS, pp.217-232, Springer, 2006.
4. [4] M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, “Key-privacy in public-key encryption, ” Asiacrypt'01, vol.2248 of LNCS, pp.566-582, Springer, 2001.
5. [5] M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, “Relations among notions of security for public key encryption schemes, ” Crypto'98, vol.1462 of LNCS, pp.26-45, Springer, 1998.