1.

Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. Topics in Cryptology–CT-RSA 2001, Springer LNCS 2020, pp. 143–158 (2001)

2.

Al-Riyami, S.S.: Cryptographic Schemes Based on Elliptic Curve Pairings. Ph.D. Thesis, University of London, UK (2004)

3.

Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Advances in Cryptology—Asiacrypt 2003, Springer LNCS 2894, pp. 452–473 (2003)

4.

Al-Riyami, S.S., Paterson, K.G.: CBE from CL-PKE: a generic construction and efficient schemes. Public Key Cryptography—PKC 2005, Springer LNCS 3386, pp. 398–415 (2005)

5.

Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. Information Security—ISC 2005, Springer LNCS 3650, pp. 134–148 (2005)

6.

Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. **21**: 178–199 (2008). Full version at IACR e-print 2005/058

7.

Boneh, D., Boyen, X.: Short Signatures without Random Oracles. Advances in Cryptology—Eurocrypt 2004, Springer LNCS 3027, pp. 56–73 (2004)

8.

Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. Advances in Cryptology—Crypto 2001, Springer LNCS 2139, pp. 213–229 (2001)

9.

Canetti, R., Goldreich, O., Goldwasser, S., Micali, S.: Resettable Zero-Knowledge. Weizmann Science Press of Israel (1999)

10.

Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology—Eurocrypt 2001, Springer-Verlag LNCS 2045, pp. 453–474 (2001)

11.

Chen L., Cheng Z., Smart N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur.

**6**, 213–241 (2007)

CrossRefGoogle Scholar12.

Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. IEEE Computer Security Foundations Workshop, pp. 219–233 (2003). The modified version of this paper is available at Cryptology ePrint Archive, Report 2002/184

13.

Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining indistinguishabilit-based proof models for key establishment protocols. Advances in Cryptology—Asiacrypt 2005, Springer LNCS 3788, pp. 585–604 (2005)

14.

Dent A.: A survey of certificateless encryption schemes and security models. Int. J. Inf. Secur.

**7**, 347–377 (2008)

CrossRefGoogle Scholar15.

Fiore, D., Gennaro, R.: Making the Diffie–Hellman protocol identity-based. Topics in Cryptology—CT-RSA 2010, Springer LNCS 5985, pp. 165–178 (2010). Also in IACR e-print archive, report 2009/174

16.

Fiore, D., Gennaro, R., Smart, N.P.: Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement. Pairing 2010, Springer LNCS 6487, pp. 167–186 (2011)

17.

Lynn, B.: Authenticated identity-based encryption. IACR e-print 2002/072 (2002)

18.

McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. Topics in Cryptology—CT-RSA 2005, Springer LNCS 3376, pp. 262–274 (2005)

19.

Paterson K., Srinivasan S.: On the relations between non-interactive key distribution, identity based-based encryption and trapdoor discrete log groups. Des. Codes Cryptogr.

**52**, 219–241 (2009)

MathSciNetMATHCrossRefGoogle Scholar20.

Scott, M.: Authenticated ID-based key exchange and remote log-in with insecure token and PIN number. Cryptology ePrint Archive, Report 2002/164

21.

Shamir, A: Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology—Proceedings of CRYPTO ’84, 1985, pp. 47–53

22.

Smart N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett.

**38**, 630–632 (2002)

MATHCrossRefGoogle Scholar