The following publications are possibly variants of this publication:
- Efficient Identity-Based Encryption with Tight Security ReductionNuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002. ieicet, 90-A(9):1803-1813, 2007. [doi]
- Efficient Identity-Based Encryption with Tight Security ReductionNuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002. cans 2006: 19-36 [doi]
- An Efficient CDH-Based Signature Scheme with a Tight Security ReductionBenoît Chevallier-Mames. crypto 2005: 511-526 [doi]
- An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security ReductionSeongHan Shin, Kazukuni Kobara, Hideki Imai. ieicet, 90-A(2):474-490, 2007. [doi]
- A Framework for Identity-Based Encryption with Almost Tight SecurityNuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada 0001. iacr, 2015:566, 2015. [doi]
- A Framework for Identity-Based Encryption with Almost Tight SecurityNuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada 0001. asiacrypt 2015: 521-549 [doi]