D. [. Agarwal, V. Freeman, and . Vaikunthanathan, Functional Encryption for Inner Product Predicates from Learning with Errors, Asiacrypt, 2011.
DOI : 10.1007/978-3-642-25385-0_2

S. [. Arora and . Safra, Probabilistic checking of proofs : A new characterization of NP, Proceedings of 33rd IEEE Symposium on Foundations of Computer Science, 1992.

M. Bellare, Introduction to Pairing-Based Cryptography, 2006.

A. [. Boneh, B. Sahai, and . Waters, Functional encryption, TCC, 2011.
DOI : 10.1145/2366316.2366333

B. [. Boneh and . Waters, Conjunctive, subset and range querries on encrypted data, TCC, 2007.
DOI : 10.1007/978-3-540-70936-7_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5164

]. G. Dow11 and . Dowek, Proofs and Algorithms : An Introduction to Logic and Computability, 2011.

J. Katz, A. Sahai, and B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Eurocrypt, 2008.
DOI : 10.1007/978-3-540-78967-3_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.8500

]. D. Mer83 and . Meredith, Seperating minimal, intuitionist and classical logic, Notre Dame Journal of Formal Logic, vol.24, issue.4, pp.485-490, 1983.

]. G. Nec97 and . Necula, Proof carrying code, Popl, 1997.

V. Shoup, Sequence of Games : A tool for Taming Complexity in Security Proofs, 2006.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Eurocrypt, 2005.
DOI : 10.1007/11426639_27

S. Thompson, Type theory and Functional Programming, 1999.

]. B. Wat08 and . Waters, Functional encryption: beyond public key cryptography, 2008.