G. Ateniese, D. H. Chou, G. Breno-de-medeiros, and . Tsudik, Sanitizable signatures, ESORICS 2005, vol.3679, pp.159-177, 2005.

M. Beck, J. Camenisch, D. Derler, S. Krenn, C. Henrich et al., Practical strongly invisible and strongly accountable sanitizable signatures, LNCS, vol.17, pp.437-452, 2017.

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, LNCS, vol.2248, pp.514-532, 2001.

C. Brzuska, H. Busch, M. Ozgür-dagdelen, M. Fischlin, S. Franz et al., Redactable signatures for tree-structured data: Definitions and constructions, LNCS, vol.10, pp.87-104, 2010.

C. Brzuska, M. Fischlin, T. Freudenreich, A. Lehmann, M. Page et al., Security of sanitizable signatures revisited, LNCS, vol.5443, pp.317-336, 2009.

C. Brzuska, M. Fischlin, A. Lehmann, and D. Schröder, Unlinkability of sanitizable signatures, PKC 2010, vol.6056, pp.444-461, 2010.

C. Brzuska, C. Henrich, K. Pöhls, and . Samelin, Non-interactive public accountability for sanitizable signatures, Public Key Infrastructures, Services and Applications, pp.178-193, 2013.

X. Bultel and P. Lafourcade, Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures, Cryptology and Network Security, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01980172

J. Camenisch, D. Derler, S. Krenn, C. Henrich, K. Pöhls et al., Chameleon-hashes with ephemeral trapdoors-and applications to invisible sanitizable signatures, Part, vol.II, pp.152-182, 2017.

S. Canard and A. Jambert, On extended sanitizable signature schemes, LNCS, vol.5985, pp.179-194, 2010.

S. Canard, A. Jambert, and R. Lescuyer, Sanitizable signatures with several signers and sanitizers, LNCS, vol.12, pp.35-52, 2012.

L. Chen, Z. Cheng, and . Smart, Identity-based key agreement protocols from pairings, International Journal of Information Security, vol.6, issue.4, pp.213-241, 2007.

R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, LNCS, vol.1462, pp.13-25, 1998.

D. Derler, C. Henrich, K. Pöhls, D. Samelin, and . Slamanig, A general framework for redactable signatures and new constructions, LNCS, vol.15, pp.3-19, 2016.

M. Fischlin and P. Harasser, Invisible sanitizable signatures and public-key encryption are equivalent, Cryptology ePrint Archive, 2018.

N. Fleischhacker, J. Krupp, G. Malavolta, J. Schneider, D. Schröder et al., Efficient unlinkable sanitizable signatures from signatures with rerandomizable keys, PKC 2016, Part I, vol.9614, pp.301-330, 2016.

M. Franklin and H. Zhang, A framework for unique ring signatures, Cryptology ePrint Archive, 2012.

G. Fuchsbauer and R. Gay, Weakly secure equivalence-class signatures from standard assumptions, IACR International Workshop on Public Key Cryptography, pp.153-183, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01869971

G. Fuchsbauer, C. Hanser, and D. Slamanig, Structure-preserving signatures on equivalence classes and constant-size anonymous credentials, vol.02, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01870052

E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, Journal of Cryptology, vol.26, issue.1, pp.80-101, 2013.

E. Fujisaki and K. Suzuki, Traceable ring signature, LNCS, vol.4450, pp.181-200, 2007.
DOI : 10.1007/978-3-540-71677-8_13

D. Steven, . Galbraith, . Kenneth-g-paterson, and . Smart, Pairings for cryptographers, vol.156, pp.3113-3121, 2008.

C. Hanser, D. Slamanig, ;. Kaoshiung, and R. O. Taiwan, Structure-preserving signatures on equivalence classes and their application to anonymous credentials, ASIACRYPT 2014, Part I, vol.8873, pp.491-511, 2014.
DOI : 10.1007/978-3-662-45611-8_26

D. Hofheinz and E. Kiltz, Programmable hash functions and their applications, LNCS, vol.5157, pp.21-38, 2008.
DOI : 10.1007/s00145-011-9102-5

URL : https://ir.cwi.nl/pub/19471/19471B.pdf

R. Johnson, L. Walsh, and M. Lamb, Homomorphic signatures for digital photographs, LNCS, vol.7035, pp.141-157, 2011.
DOI : 10.1007/978-3-642-27576-0_12

R. Johnson, D. Molnar, D. X. Song, and D. Wagner, Homomorphic signature schemes, LNCS, vol.2271, pp.244-262, 2002.

S. Krenn, K. Samelin, and D. Sommer, Stronger security for sanitizable signatures, Data Privacy Management, and Security Assurance, pp.100-117, 2016.
DOI : 10.1007/978-3-319-29883-2_7

W. F. Russell, T. Lai, . Zhang, S. M. Sherman, D. Chow et al., Efficient sanitizable signatures without random oracles, ESORICS 2016, Part I, vol.9878, pp.363-380, 2016.

J. K. Liu, V. K. Wei, and D. S. Wong, Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract), LNCS, vol.3108, pp.325-335, 2004.

J. Lu and W. Xinmei, Verifiable ring signature, 2003.

K. Miyazaki, G. Hanaoka, and H. Imai, Invisibly sanitizable digital signature scheme, IEICE TRANSACTIONS on Fundamentals of Electronics, 2008.

P. Morillo, C. , and J. L. Villar, The kernel matrix Diffie-Hellman assumption, ASIACRYPT 2016, Part I, vol.10031, pp.729-758, 2016.

T. Okamoto, M. Tada, and E. Okamoto, Extended proxy signatures for smart cards, Masahiro Mambo and Yuliang Zheng, vol.1729, pp.247-258, 1999.
DOI : 10.1007/3-540-47790-x_21

C. Henrich, K. Pöhls, and . Samelin, On updatable redactable signatures, LNCS, vol.14, pp.457-475, 2014.

K. Shim, An identity-based proxy signature scheme from pairings, ICICS 06, vol.4307, pp.60-71, 2006.

H. Wang and J. Pieprzyk, Efficient one-time proxy signatures, LNCS, vol.2894, pp.507-522, 2003.

S. Xu and M. Yung, Accountable ring signatures: A smart card approach, Smart Card Research and Advanced Applications VI, pp.271-286, 2004.