M. Abdalla, E. Kiltz, and G. Neven, Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, pp.139-154, 2007.
DOI : 10.1007/978-3-540-74835-9_10

URL : https://hal.archives-ouvertes.fr/hal-00918551

S. Al-riyami, J. Malone-lee, and N. Smart, Escrow-free encryption supporting cryptographic workflow, International Journal of Information Security, vol.22, issue.4, pp.217-229, 2006.
DOI : 10.1007/s10207-006-0002-x

N. Attrapadung and H. Imai, Dual-Policy Attribute Based Encryption, ACNS'09, pp.168-185, 2009.
DOI : 10.1007/978-3-642-01957-9_11

N. Attrapadung and H. Imai, Conjunctive Broadcast and Attribute-Based Encryption, Pairing'09, pp.248-265, 2009.
DOI : 10.1007/11426639_27

N. Attrapadung and B. Libert, Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation, PKC'10, pp.384-402, 2010.

N. Attrapadung, B. Libert, and E. D. Panfieu, Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC'11, pp.90-108, 2011.
DOI : 10.1007/978-3-642-19379-8_6

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, pp.440-456, 2005.
DOI : 10.1007/11426639_26

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Crypto'04, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Earlier version in Crypto'01, pp.586-615, 2001.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005.
DOI : 10.1007/11535218_16

D. Boneh and M. Hamburg, Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, pp.455-470, 2008.
DOI : 10.1007/3-540-36178-2_33

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, TCC'11, pp.253-273, 2011.
DOI : 10.1007/978-3-642-19571-6_16

X. Boyen, General Ad Hoc Encryption from Exponent Inversion IBE, Eurocrypt'07, pp.394-411, 2007.
DOI : 10.1007/978-3-540-72540-4_23

R. Canetti and S. Goldwasser, An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), Eurocrypt'99, pp.90-106, 1999.
DOI : 10.1007/3-540-48910-X_7

R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, pp.254-271, 2003.

R. Canetti, S. Halevi, and J. Katz, Chosen-Ciphertext Security from Identity-Based Encryption, Eurocrypt'04, pp.207-222, 2004.
DOI : 10.1007/978-3-540-24676-3_13

Z. Chai, Z. Cao, and Y. Zhou, Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), pp.148-154, 2006.
DOI : 10.1109/IMSCCS.2006.217

M. Chase, Multi-authority Attribute Based Encryption, TCC'07, pp.515-534, 2007.
DOI : 10.1007/978-3-540-70936-7_28

M. Chase and S. Chow, Improving privacy and security in multi-authority attribute-based encryption, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.121-130, 2009.
DOI : 10.1145/1653662.1653678

J. Cheon, Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, pp.1-11, 2006.
DOI : 10.1007/11761679_1

L. Cheung and C. Newport, Provably secure ciphertext policy ABE, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.456-465, 2007.
DOI : 10.1145/1315245.1315302

V. Daza, J. Herranz, P. Morillo, and C. , CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, ProvSec'07, pp.35-50, 2007.
DOI : 10.1007/978-3-540-75670-5_3

C. Delerablée, P. Paillier, and D. , Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Pairing'07, pp.39-59, 2007.
DOI : 10.1007/978-3-540-73489-5_4

C. Delerablée and D. Pointcheval, Dynamic Threshold Public-Key Encryption, Crypto'08, pp.317-334, 2008.
DOI : 10.1007/978-3-540-85174-5_18

K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length, ISPEC '09, pp.13-23, 2009.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded Ciphertext Policy Attribute Based Encryption, ICALP LNCS, vol.5126, issue.2, pp.579-591, 2008.
DOI : 10.1007/978-3-540-70583-3_47

J. Herranz, F. Laguillaumie, and C. , Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, 2010.
DOI : 10.1007/978-3-642-13013-7_2

URL : https://hal.archives-ouvertes.fr/hal-01083535

J. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, pp.146-162, 2008.

A. Lewko, A. Sahai, and B. Waters, Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.23

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt'10, pp.62-91, 2010.
DOI : 10.1007/978-3-642-13190-5_4

M. Naor, On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003.
DOI : 10.1007/978-3-540-45146-4_6

M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, pp.1-20, 1962.

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.195-203, 2007.
DOI : 10.1145/1315245.1315270

R. Sakai and M. Kasahara, ID-based Cryptosystems with Pairing on Elliptic Curve. Cryptology ePrint Archive, Report, p.54, 2003.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005.
DOI : 10.1007/11426639_27

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Crypto'84, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

T. Okamoto and K. Takashima, Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, pp.191-208, 2010.
DOI : 10.1007/978-3-642-14623-7_11

B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, PKC 2011, pp.53-70, 2011.
DOI : 10.1007/978-3-642-19379-8_4

S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption, PKC 2011, pp.71-89, 2011.
DOI : 10.1007/978-3-642-19379-8_5