Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai. Cryptology ePrint Archive, Report 2004/338, (2005)supersedes a previous version which is entitled as 'Identity-Based
Encryption with Non-Interactive Key Update'..
J. Camenisch, and E. Herreweghen. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, page 21-30. New York, NY, USA, ACM, (2002)