E. Shi, J. Bethencourt, H. T. Chan, D. Song, and A. Perrig, Multi-Dimensional Range Query over Encrypted Data, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.350-364, 2007.
DOI : 10.1109/SP.2007.29

E. Shi, B. Waters, L. Aceto, I. Damgård, L. A. Goldberg et al., Delegating Capabilities in Predicate Encryption Systems, Part II, pp.560-578, 2008.
DOI : 10.1007/978-3-540-70583-3_46

D. Boneh and B. Waters, Conjunctive, Subset, and Range Queries on Encrypted Data, TCC 2007, pp.535-554, 2007.
DOI : 10.1007/978-3-540-70936-7_29

J. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, EUROCRYPT 2008, pp.146-162, 2008.

E. Shen, E. Shi, and B. Waters, Predicate Privacy in Encryption Systems, TCC 2009, pp.457-473, 2009.
DOI : 10.1007/978-3-642-00457-5_27

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO'84, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

D. Boneh and M. Franklin, Identity-Based Encryption From the Weil Pairing, CRYPTO 2001, pp.213-229, 2001.

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, EUROCRYPT 2005, pp.114-127, 2005.
DOI : 10.1007/11426639_7

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

C. Gentry, Practical Identity-Based Encryption Without Random Oracles, EUROCRYPT 2006, pp.445-464, 2006.
DOI : 10.1007/11761679_27

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-Based Encryption for Finegrained Access Control of Encrypted Data, ACM Conference on Computer and Communication Security, pp.89-98, 2006.

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, ROCRYPT 2005, pp.457-473, 2005.
DOI : 10.1007/11426639_27

J. Horwitz and B. Lynn, Toward Hierarchical Identity-Based Encryption, EUROCRYPT 2002, pp.466-481, 2002.
DOI : 10.1007/3-540-46035-7_31

X. Boyen and B. Waters, Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), CRYPTO 2006, pp.290-307, 2006.
DOI : 10.1007/11818175_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.363.3487

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, pp.440-456, 2005.
DOI : 10.1007/11426639_26