G. Ateniese, D. H. Chou, G. Breno-de-medeiros, and . Tsudik, Sanitizable Signatures, pp.159-177, 2005.
DOI : 10.1007/11555827_10

M. H. Au, W. Susilo, and S. Yiu, , pp.223-234, 2006.

M. Bellare and O. Goldreich, On defining proofs of knowledge, pp.390-420
DOI : 10.1007/3-540-48071-4_28

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48071-4_28.pdf

A. Bender, J. Katz, and R. Morselli, Ring signatures: Stronger definitions, and constructions without random oracles, LNCS, vol.3876, pp.60-79, 2006.
DOI : 10.1007/11681878_4

URL : https://link.springer.com/content/pdf/10.1007%2F11681878_4.pdf

D. Boneh, The decision Diffie-Hellman problem, Third Algorithmic Number Theory Symposium (ANTS), vol.1423, 1998.
DOI : 10.1007/bfb0054851

, LNCS, vol.92, 1993.

C. Brzuska, H. Busch, O. Dagdelen, M. Fischlin, M. Franz et al., Andreas Peter, Bertram Poettering, and Dominique Schröder. Redactable Signatures for Tree-Structured Data: Definitions and Constructions, 2010.

C. Brzuska, M. Fischlin, T. Freudenreich, A. Lehmann, M. Page et al., Security of sanitizable signatures revisited, LNCS, vol.5443, pp.317-336, 2009.
DOI : 10.1007/978-3-642-00468-1_18

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-00468-1_18.pdf

C. Brzuska, M. Fischlin, A. Lehmann, and D. Schröder, Unlinkability of sanitizable signatures, PKC 2010, vol.6056, pp.444-461, 2010.
DOI : 10.1007/978-3-642-13013-7_26

C. Brzuska, C. Henrich, K. Pöhls, and . Samelin, Non-interactive Public Accountability for Sanitizable Signatures, pp.178-193, 2013.
DOI : 10.1007/978-3-642-40012-4_12

C. Brzuska, C. Henrich, K. Pöhls, and . Samelin, Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures, pp.12-30, 2014.
DOI : 10.1007/978-3-642-53997-8_2

X. Bultel and P. Lafourcade, Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures. Cryptology ePrint Archive, 2017.
DOI : 10.1007/978-3-030-02641-7_10

URL : https://hal.archives-ouvertes.fr/hal-01964491

S. Canard and A. Jambert, On Extended Sanitizable Signature Schemes, pp.179-194, 2010.
DOI : 10.1007/978-3-642-11925-5_13

S. Canard, A. Jambert, and R. Lescuyer, Sanitizable Signatures with Several Signers and Sanitizers, pp.35-52, 2012.
DOI : 10.1007/978-3-642-31410-0_3

S. Canard, B. Schoenmakers, M. Stam, and J. Traor, List signature schemes, Discrete Applied Mathematics, vol.154, issue.2, pp.189-201, 2006.

Z. Changlun, L. Yun, and H. Dequan, A new verifiable ring signature scheme based on nyberg-rueppel scheme, 8th international Conference on Signal Processing, 2006.
DOI : 10.1109/icosp.2006.346099

M. Chase and A. Lysyanskaya, On Signatures of Knowledge, pp.78-96, 2006.
DOI : 10.1007/11818175_5

D. Chaum, P. Torben, and . Pedersen, Wallet databases with observers, pp.89-105
DOI : 10.1007/3-540-48071-4_7

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-48071-4_7.pdf

R. Cramer, I. Damgård, and B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, LNCS, vol.94, 1994.

A. Fiat and A. Shamir, Advances in Cryptology-CRYPTO' 86: Proceedings, chapter How To Prove Yourself: Practical Solutions to Identification and Signature Problems, pp.186-194, 1987.

N. Fleischhacker, J. Krupp, G. Malavolta, J. Schneider, D. Schrder et al., Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys, Public-Key Cryptography PKC 2016, 2016.
DOI : 10.1007/978-3-662-49384-7_12

G. Fuchsbauer and D. Pointcheval, Anonymous Proxy Signatures, 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM Journal on Computing, vol.18, issue.1, pp.186-208, 1989.
DOI : 10.1137/0218012

URL : http://crypto.cs.mcgill.ca/~crepeau/COMP647/2007/TOPIC02/GMR89.pdf

F. Hoshino, T. Kobayashi, and K. Suzuki, Anonymizable Signature and Its Construction from Pairings, pp.62-77, 2010.
DOI : 10.1007/978-3-642-17455-1_5

R. Johnson, D. Molnar, D. Song, and D. Wagner, Homomorphic Signature Schemes, pp.244-262, 2002.
DOI : 10.1007/3-540-45760-7_17

URL : http://www.cs.berkeley.edu/~dawnsong/papers/homsig.ps

W. F. Russell, T. Lai, . Zhang, S. M. Sherman, D. Chow et al., Efficient Sanitizable Signatures Without Random Oracles, pp.363-380, 2016.

K. C. Lee, H. A. Wen, and T. Hwang, Convertible ring signature. IEE Proceedings-Communications, vol.152, pp.411-414, 2005.
DOI : 10.1049/ip-com:20045283

J. Lv and X. Wang, Verifiable Ring Signature, DMS Proceedings, pp.663-665, 2003.

R. L. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, LNCS, vol.2248, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-45682-1_32.pdf

C. Schnorr, Efficient identification and signatures for smart cards, LNCS, vol.89, pp.239-252, 1990.
DOI : 10.1007/3-540-46885-4_68

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-46885-4_68.pdf

R. Steinfeld, L. Bull, and Y. Zheng, Content Extraction Signatures, pp.285-304, 2002.
DOI : 10.1007/3-540-45861-1_22

URL : http://www.sis.uncc.edu/~yzheng/publications/files/CES_full-2003.pdf

S. Wang, R. Ma, Y. Zhang, and X. Wang, Ring signature scheme based on multivariate public key cryptosystems, Computers and Mathematics with Applications, vol.62, issue.10, pp.3973-3979, 2011.
DOI : 10.1016/j.camwa.2011.09.052

URL : https://doi.org/10.1016/j.camwa.2011.09.052