S. L. Paulo, M. Barreto, and . Naehrig, Pairing-friendly elliptic curves of prime order, Selected Areas in Cryptography, 12th International Workshop, 2005.

A. Barth, D. Boneh, and B. Waters, Privacy in Encrypted Content Distribution Using Private Broadcast Encryption, Financial Cryptography and Data Security, 10th International Conference, 2006.
DOI : 10.1007/11889663_4

URL : http://www.csl.sri.com/users/bwaters/publications/papers/privatebe.pdf

S. Canard, N. Desmoulins, J. Devigne, and J. Traoré, On the Implementation of a Pairing-Based Cryptographic Protocol in a Constrained Device, Pairing-Based Cryptography -Pairing 2012 -5th International Conference, 2012.
DOI : 10.1007/978-3-642-36334-4_14

R. Canetti, S. Halevi, and J. Katz, A forward-secure publickey encryption scheme, Advances in Cryptology -Proc of EURO- CRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, 2003.

C. Delerablée, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Advances in Cryptology -Proc of ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, 2007.
DOI : 10.1007/978-3-540-76900-2_12

A. Fiat and M. Naor, Broadcast Encryption, Advances in Cryptology -Proc of CRYPTO '93, 13th Annual International Cryptology Conference, 1993.
DOI : 10.1007/3-540-48329-2_40

S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Applied Mathematics, vol.156, issue.16, 2008.
DOI : 10.1016/j.dam.2007.12.010

URL : https://doi.org/10.1016/j.dam.2007.12.010

R. Granger, T. Kleinjung, and J. Zumbrägel, On the discrete logarithm problem in finite fields of fixed characteristic, Transactions of the American Mathematical Society, vol.370, issue.5, 2015.
DOI : 10.1090/tran/7027

URL : http://arxiv.org/pdf/1507.01495

, Thread Group. Thread commissioning whitepaper, 2015.

Y. Jun, W. Kim, D. Hu, S. Sarkar, and . Jha, Esiot: enabling secure management of the internet of things, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology, Proceedings of CRYPTO '84, 1984.
DOI : 10.1007/3-540-39568-7_5

V. Shoup, Sequences of games: a tool for taming complexity in security proofs, IACR Cryptology ePrint Archive, 2004.