1 R. Canetti., "The random oracle methodology, revisited" 51 (51): 209-218, 2004
2 "The Standards for Efficient Cryptography Group (SECG), SEC 2: Recommended elliptic curve domain parameters, Version 1.0"
3 M. Bellare., "Random oracles are practical : a paradigm for designing efficient protocols" 62-73, 1993
4 J. Li., "Provably secure certificate-based signature scheme without pairings" 233 : 313-320, 2013
5 MIRACL, "Multiprecision integer and rational arithmetic cryptographic library"
6 C. Sur., "Multi-receiver certificate-based encryption and application to public key broadcast encryption" 35-40, 2007
7 D. Galindo., "Improved certificate-based encryption in the standard model" 81 (81): 1218-1226, 2008
8 T. Hyla., "Implicit and explicit certificates-based encryption scheme" 651-666, 2014
9 A. Shamir, "Identity-based cryptosystems and signature schemes" 47-53, 1984
10 E. Fujisaki., "How to enhance the security of public-key encryption at minimum cost" 53-68, 1999
1 R. Canetti., "The random oracle methodology, revisited" 51 (51): 209-218, 2004
2 "The Standards for Efficient Cryptography Group (SECG), SEC 2: Recommended elliptic curve domain parameters, Version 1.0"
3 M. Bellare., "Random oracles are practical : a paradigm for designing efficient protocols" 62-73, 1993
4 J. Li., "Provably secure certificate-based signature scheme without pairings" 233 : 313-320, 2013
5 MIRACL, "Multiprecision integer and rational arithmetic cryptographic library"
6 C. Sur., "Multi-receiver certificate-based encryption and application to public key broadcast encryption" 35-40, 2007
7 D. Galindo., "Improved certificate-based encryption in the standard model" 81 (81): 1218-1226, 2008
8 T. Hyla., "Implicit and explicit certificates-based encryption scheme" 651-666, 2014
9 A. Shamir, "Identity-based cryptosystems and signature schemes" 47-53, 1984
10 E. Fujisaki., "How to enhance the security of public-key encryption at minimum cost" 53-68, 1999
11 Z. Shao, "Enhanced certificate-based encryption from pairings" 37 (37): 136-146, 2011
12 C. P. Schnorr, "Efficient signature generation by smart cards" 4 (4): 161-174, 1991
13 C. P. Schnorr, "Efficient identifications and signatures for smart cards" 239-252, 1989
14 Y. Lu., "Efficient construction of certificate-based encryption secure against public key replacement attacks in the standard model" 30 (30): 1553-1568, 2014
15 J. K. Liu., "Efficient certificate-based encryption in the standard model" 144-155, 2008
16 Y. Lu., "Constructing efficient certificate-based encryption with pairing" 4 (4): 19-26, 2009
17 S. S. Al-Riyami., "Certificateless public key cryptography" 452-473, 2003
18 W. Wu., "Certificate-based signatures, revisited" 15 (15): 1659-1684, 2009
19 J. Li., "Certificate-based signature : security model and efficient construction" 110-125, 2007
20 C. Gentry, "Certificate-based encryption and the certificate revocation problem" 272-293, 2003
21 Ji Yao, "Certificate-Based Encryption Scheme without Pairing" 한국인터넷정보학회 7 (7): 1480-1491, 2013
22 M. H. Au., "Certificate based(linkable)ring signature" 79-92, 2007
23 J. K. Liu., "Certificate based signature schemes without pairings or random oracles" 285-297, 2008
24 J. Li., "An Efficient short certificate-based signature scheme" 85 (85): 314-322, 2012
25 W. Wu., "A provably secure construction of certificate-based encryption from certificateless encryption" 55 (55): 1157-1168, 2012
26 B. G. Kang., "A certificate-based signature scheme" 99-111, 2004