M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, Structure-preserving signatures and commitments to group elements, Advances in Cryptology -CRYPTO 2010, 2010.

G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, Proc. of Crypto, pp.255-270, 2000.
DOI : 10.1007/3-540-44598-6_16

M. Bellare, A. Boldyreva, and A. Neill, Deterministic and Efficiently Searchable Encryption, Proc. of Crypto, pp.535-552, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792

M. Bellare, M. Fischlin, A. O. Neill, and T. Ristenpart, Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, Proc. of Crypto, pp.360-378, 2008.
DOI : 10.1007/978-3-540-85174-5_20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.98

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

M. Bellare, H. Shi, and C. Zhang, Foundations of Group Signatures: The Case of Dynamic Groups, Proc. of CT-RSA 2005, pp.136-153, 2005.
DOI : 10.1007/978-3-540-30574-3_11

M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo random bits, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.850-864, 1984.
DOI : 10.1109/SFCS.1982.72

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Proc. of Crypto, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, EUROCRYPT 2004, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

D. Boneh and H. Shacham, Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004.
DOI : 10.1145/1030083.1030106

J. Camenisch and J. Groth, Group Signatures: Better Efficiency and New Theoretical Aspects, SCN 2004, pp.120-133, 2004.
DOI : 10.1007/978-3-540-30598-9_9

G. Fuchsbauer, Automorphic signatures in bilinear groups and an application to round-optimal blind signatures. Cryptology ePrint Archive, Report, vol.320, 2009.

T. Fuhr and P. Paillier, Decryptable Searchable Encryption, Proc. of ProvSec, pp.228-236, 2007.
DOI : 10.1007/978-3-540-75670-5_17

O. Goldreich and L. A. Levin, A hard-core predicate for all one-way functions, Proceedings of the twenty-first annual ACM symposium on Theory of computing , STOC '89, pp.25-32, 1989.
DOI : 10.1145/73007.73010

J. Groth, Fully Anonymous Group Signatures Without Random Oracles, Proc. of Asiacrypt, pp.164-180, 2007.
DOI : 10.1007/978-3-540-76900-2_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.6315

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Proc. of Eurocrypt, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

E. Kiltz, Chosen-Ciphertext Security from Tag-Based Encryption, LNCS, vol.3876, pp.581-600, 2006.
DOI : 10.1007/11681878_30

B. Libert and D. Vergnaud, Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model, Proc. of CANS 2009, pp.498-517, 2009.
DOI : 10.1007/978-3-642-10433-6_34

URL : https://hal.archives-ouvertes.fr/inria-00577255

T. Nakanishi and N. Funabiki, Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps, ASIACRYPT'05, pp.533-548, 2005.

T. Nakanishi and N. Funabiki, A short verifier-local revocation group signature scheme with backward unlinkability, IWSEC, pp.17-32, 2006.

R. Ostrovsky, W. E. Skeith, and I. , Private Searching on Streaming Data, Journal of Cryptology, vol.20, issue.4, pp.397-430, 2007.
DOI : 10.1007/s00145-007-0565-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7131

G. Yang, C. How-tan, Q. Huang, and D. S. Wong, Probabilistic Public Key Encryption with Equality Test, Proc. of CT-RSA 2010, pp.119-131, 2010.
DOI : 10.1007/978-3-642-11925-5_9

A. Yao, Theory and applications of trapdoor functions (extended abstract), Proc. of FOCS'82, pp.80-91, 1982.

S. Zhou and D. Lin, Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps, CANS 2006, pp.126-143, 2006.
DOI : 10.1007/11935070_8