C. Fleurent, F. Glover, P. Michelon, and Z. Valli. Evolutionary Computation, 1996., Proceedings of IEEE International Conference on, page 643--648. (May 1996)
U. Feige, A. Fiat, and A. Shamir. STOC '87: Proceedings of the nineteenth annual ACM conference on
Theory of computing, page 210--217. New York, NY, USA, ACM, (1987)
Z. Chen, J. Huang, D. Huang, J. Zhang, and Y. Wang. 18th International Conference on Advanced Information Networking
and Applications (AINA 2004), 2, page 384--387. (2004)
J. Cha, and J. Cheon. PKC '03: Proceedings of the 6th International Workshop on Theory
and Practice in Public Key Cryptography, page 18--30. London, UK, Springer-Verlag, (2003)
Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai. Cryptology ePrint Archive, Report 2004/338, (2005)supersedes a previous version which is entitled as 'Identity-Based
Encryption with Non-Interactive Key Update'..