N. Attrapadung, B. Libert, and E. De-panafieu, Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC'11, pp.90-108, 2011.
DOI : 10.1007/978-3-642-19379-8_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.680.2516

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Euro- crypt'04, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Euro- crypt'05, pp.440-456, 2005.
DOI : 10.1007/11426639_26

URL : http://ai.stanford.edu/~xb/eurocrypt05a/eurocrypt05tinyhibe.ps

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Crypto'04, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

X. Boyen, Mesh Signatures, Eurocrypt'07, pp.210-227, 2007.
DOI : 10.1007/978-3-540-72540-4_12

E. Bresson, J. Stern, and M. Szydlo, Threshold Ring Signatures and Applications to Ad-hoc Groups, Crypto'02, pp.465-480, 2002.
DOI : 10.1007/3-540-45708-9_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8201

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005.
DOI : 10.1007/11535218_16

D. Boneh and M. Hamburg, Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, pp.455-470, 2008.
DOI : 10.1007/3-540-36178-2_33

E. F. Brickell, Some Ideal Secret Sharing Schemes, In Journal of Combinatorial Mathematics and Combinatorial Computing, vol.9, pp.105-113, 1989.
DOI : 10.1007/3-540-46885-4_45

V. Daza, J. Herranz, P. Morillo, and C. , Extended access structures and their cryptographic applications, Applicable Algebra in Engineering, Communication and Computing, pp.257-284, 2010.

C. Delerablée and D. , Dynamic Threshold Public-Key Encryption, Crypto'08, pp.317-334, 2008.
DOI : 10.1007/978-3-540-85174-5_18

K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, A ciphertext-policy attribute-based encryption scheme with constant ciphertext length, ISPEC '09, pp.13-23, 2009.

A. Escala, J. Herranz, and P. Morillo, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Africacrypy'11, pp.224-241, 2011.
DOI : 10.1007/11426639_7

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Crypto'86, pp.186-194, 1986.
DOI : 10.1007/3-540-47721-7_12

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt'08, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.8523

J. Herranz, F. Laguillaumie, and C. , Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, pp.19-34, 2010.
DOI : 10.1007/978-3-642-13013-7_2

URL : https://hal.archives-ouvertes.fr/hal-01083535

D. Hofheinz and E. Kiltz, Programmable hash functions and their applications, Crypto'08, pp.21-38, 2008.
DOI : 10.1007/s00145-011-9102-5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7292

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt'10, pp.62-91, 2010.
DOI : 10.1007/978-3-642-13190-5_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.2844

J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, Attribute-based signature and its applications, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.60-69, 2010.
DOI : 10.1145/1755688.1755697

URL : http://ro.uow.edu.au/cgi/viewcontent.cgi?article=8730&context=era

J. Li and K. Kim, Hidden attribute-based signatures without anonymity revocation, Information Sciences, pp.1681-1689, 2010.
DOI : 10.1016/j.ins.2010.01.008

T. Malkin, I. Teranishi, Y. Vahlis, and M. Yung, Signatures Resilient to Continual Leakage on Memory and Computation, TCC'11, pp.89-106, 2011.
DOI : 10.1007/978-3-642-19571-6_7

H. K. Maji, M. Prabhakaran, and M. Rosulek, Attribute-Based Signatures, CT-RSA'11, pp.376-392, 2011.
DOI : 10.1007/11426639_7

M. Naor, On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003.
DOI : 10.1007/978-3-540-45146-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9911

T. Okamoto and K. Takashima, Homomorphic Encryption and Signatures from Vector Decomposition, Pair- ing'08, pp.57-74, 2008.
DOI : 10.1007/978-3-540-85538-5_4

T. Okamoto and K. Takashima, Efficient attribute-based signatures for non-monotone predicates in the standard model, PKC'11, pp.35-52, 2011.

R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Asiacrypt'01, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005.
DOI : 10.1007/11426639_27

S. F. Shahandashti and R. Safavi-naini, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, Africacrypt'09, pp.198-216, 2009.
DOI : 10.1007/11426639_7

T. Tassa, Hierarchical Threshold Secret Sharing, Journal of Cryptology, vol.20, issue.2, pp.237-264, 2007.
DOI : 10.1007/s00145-006-0334-8

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt'05, pp.114-127, 2005.
DOI : 10.1007/11426639_7