D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing

B. , M. Blum, P. Feldman, and S. Micali, Non-interactive zero-knowledge and its applications (extended abstract), 20th Annual ACM Symposium on Theory of Computing, pp.103-112, 1988.

D. Bernhard, M. Fischlin, and B. Warinschi, Adaptive proofs of knowledge in the random oracle model, Public-Key Cryptography -PKC 2015 -18th IACR International Conference on Practice and Theory in Public-Key Cryptography Proceedings, pp.629-649, 2015.

X. Boyen, The Uber-Assumption Family, PAIRING 2008: 2nd International Conference on Pairing-based Cryptography, pp.39-56, 2008.
DOI : 10.1007/978-3-540-85538-5_3

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

U. Feige, D. Lapidot, and A. Shamir, Multiple non-interactive zero knowledge proofs based on a single random string (extended abstract), 31st Annual Symposium on Foundations of Computer Science, pp.308-317, 1990.

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptology ? CRYPTO'86, pp.186-194, 1987.
DOI : 10.1007/3-540-47721-7_12

G. Shafi-goldwasser, S. D. Gordon, V. Goyal, A. Jain, J. Katz et al., Multi-input Functional Encryption, Advances in Cryptology -EUROCRYPT 2014 -33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.578-602, 2014.
DOI : 10.1007/978-3-642-55220-5_32

G. S. Garg, C. Gentry, S. Halevi, and M. Raykova, Two-Round Secure MPC from Indistinguishability Obfuscation, Theory of Cryptography -11th Theory of Cryptography Conference. Proceedings, pp.74-94, 2014.
DOI : 10.1007/978-3-642-54242-8_4

G. and O. Goldreich, Foundations of Cryptography: Basic Applications, 2004.

F. Hao, Y. A. Peter, P. Ryan, and . Zielinski, Anonymous voting by two-round public discussion, IET Information Security, vol.4, issue.2, pp.62-67, 2010.
DOI : 10.1049/iet-ifs.2008.0127

V. Iovino and K. Zebrowski, Simulation-Based Secure Functional Encryption in the Random Oracle Model, Progress in Cryptology -LATINCRYPT 2015 -4th International Conference on Cryptology and Information Security in Latin America Proceedings, pp.21-39, 2015.
DOI : 10.1007/978-3-319-22174-8_2

A. Joux, A one round protocol for tripartite Diffie-Hellman, Journal of Cryptology, vol.17, issue.4, pp.263-276, 2004.

K. , D. Khader, B. Smyth, Y. A. Peter, F. Ryan et al., A fair and robust voting system by broadcast, 5th International Conference on Electronic Voting 2012 Co-organized by the Council of Europe, Gesellschaft für Informatik and E-Voting.CC, pp.285-299, 2012.

M. , S. Micali, R. Pass, and A. Rosen, Input-indistinguishable computation, 47th Annual Symposium on Foundations of Computer Science, pp.367-378, 2006.

A. Yao, Near-optimal time-space tradeoff for element distinctness, 29th Annual Symposium on Foundations of Computer Science, pp.91-97, 1988.