G. Ateniese and P. Gasti, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, CT-RSA'09, pp.32-47, 2009.
DOI : 10.1007/3-540-39568-7_5

J. Baek, W. Susilo, and J. Zhou, New constructions of fuzzy identity-based encryption, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.368-370, 2007.
DOI : 10.1145/1229285.1229330

K. Bentahar, P. Farshim, J. Malone-lee, and N. P. Smart, Generic Constructions of Identity-Based and Certificateless KEMs, Journal of Cryptology, vol.33, issue.2, pp.178-199, 2008.
DOI : 10.1007/s00145-007-9000-z

D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, and M. Hamburg, Space-Efficient Identity Based Encryption Without Pairings, FOCS'07, pp.647-657, 2007.

X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, Secure Remote Authentication Using Biometric Data, EUROCRYPT'05, pp.147-163, 2005.
DOI : 10.1007/11426639_9

URL : http://ai.stanford.edu/~xb/eurocrypt05b/fuzzy-full.ps

J. Bringer, H. Chabanne, G. D. Cohen, B. Kindarji, and G. Zémor, Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007.
DOI : 10.1109/BTAS.2007.4401904

URL : https://hal.archives-ouvertes.fr/hal-00270547

J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang et al., An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, ACISP'07, pp.96-106, 2007.
DOI : 10.1007/978-3-540-73458-1_8

A. Burnett, F. Byrne, T. Dowling, and A. Duffy, A Biometric Identity Based Signature Scheme, International Journal of Network Security, vol.5, issue.3, pp.317-326, 2007.

C. Chen, R. N. Veldhuis, T. A. Kevenaar, and A. H. Akkermans, Multibits biometric string generation based on the likelyhood ratio, BTAS'07, pp.1-6, 2007.

Y. Dodis and A. Smith, Correcting errors without leaking partial information, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.654-663, 2005.
DOI : 10.1145/1060590.1060688

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3846

E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, Crypto'99, pp.537-554, 1999.

J. Furukawa, N. Attrapadung, R. Sakai, and G. Hanaoka, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, INDOCRYPT'08, pp.116-129, 2008.
DOI : 10.1007/11426639_27

T. Kitagawa, P. Yang, G. Hanaoka, R. Zhang, H. Watanabe et al., Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT, ACISP'06, 2006.
DOI : 10.1007/11780656_29

Q. Li, Y. Sutcu, and N. D. Memon, Secure Sketch for Biometric Templates, ASIACRYPT'06, pp.99-113, 2006.
DOI : 10.1007/11935230_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.4275

T. Okamoto and D. Pointcheval, REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform, CT-RSA'01, pp.159-175, 2001.
DOI : 10.1007/3-540-45353-9_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.5590

M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure Attribute-Based Systems, ACM CCS'06, pp.99-112, 2006.
DOI : 10.3233/jcs-2009-0383

URL : http://doi.org/10.3233/jcs-2009-0383

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, EUROCRYPT'05, pp.457-473, 2005.
DOI : 10.1007/11426639_27

N. D. Sarier, A New Biometric Identity Based Encryption Scheme, 2008 The 9th International Conference for Young Computer Scientists, pp.2061-2066, 2008.
DOI : 10.1109/ICYCS.2008.420

N. D. Sarier, Biometric Identity Based Signature Revisited, EuroPKI'09, 2009.
DOI : 10.1007/978-3-642-16441-5_18

S. F. Shahandashti and R. Safavi-naini, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, AFRICACRYPT'09, pp.198-216, 2009.
DOI : 10.1007/11426639_7

Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval, A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, ISPEC'08, pp.56-70, 2008.
DOI : 10.1007/978-3-540-79104-1_5

URL : https://hal.archives-ouvertes.fr/inria-00419156

P. P. Van-liesdonk, Anonymous and Fuzzy Identity-Based Encryption. Master's thesis, 2007.

P. Yang, Z. Cao, and X. Dong, Fuzzy Identity Based Signature, Cryptology ePrint Archive Report, vol.002, 2008.