M. Abdalla, F. Bourse, A. De-caro, and D. , Simple Functional Encryption Schemes for Inner Products, PKC 2015, pp.733-751, 2015.
DOI : 10.1007/978-3-662-46447-2_33

URL : https://hal.archives-ouvertes.fr/hal-01108287

S. Agrawal, D. Freeman, and V. Vaikuntanathan, Functional Encryption for Inner Product Predicates from Learning with Errors, Asiacrypt 2011, pp.21-40, 2011.
DOI : 10.1007/978-3-642-25385-0_2

S. Agrawal, B. Libert, and D. Stehlé, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Crypto 2016 Cryptology ePrint Archive, 2015.
DOI : 10.1007/978-3-662-49890-3_21

URL : https://hal.archives-ouvertes.fr/hal-01228559

N. Attrapadung and B. Libert, Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, pp.384-402, 2010.

N. Attrapadung, B. Libert, and E. Panafieu, Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC 2011, pp.90-108, 2011.
DOI : 10.1007/978-3-642-19379-8_6

M. Bellare, B. Waters, and S. Yilek, Identity-Based Encryption Secure against Selective Opening Attack, TCC 2011, pp.235-252, 2011.
DOI : 10.1007/978-3-642-19571-6_15

A. Bishop, A. Jain, and L. Kowalczyk, Function-Hiding Inner Product Encryption, Asiacrypt'15, pp.470-491, 2015.
DOI : 10.1007/978-3-662-48797-6_20

D. Boneh and X. Boyen, Short Signatures Without Random Oracles, Eurocrypt'04, pp.56-73, 2004.
DOI : 10.1007/978-3-540-24676-3_4

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Crypto'04, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, pp.440-456, 2005.
DOI : 10.1007/11426639_26

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, TCC'05, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005.
DOI : 10.1007/11535218_16

J. Camenisch, M. Kohlweiss, and C. Soriente, An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, PKC'09, pp.481-500, 2009.
DOI : 10.1007/978-3-642-00468-1_27

D. Catalano and D. Fiore, Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases, Cryptology ePrint Archive, 2011.

J. Chen, R. Gay, and H. Wee, Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, Eurocrypt 2015 LNCS 9057, pp.595-624
DOI : 10.1007/978-3-662-46803-6_20

URL : https://hal.archives-ouvertes.fr/hal-01220358

M. Chase and S. Meiklejohn, D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, Eurocrypt 2014, pp.622-639, 2002.
DOI : 10.1007/978-3-642-55220-5_34

J. Cheon, Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, pp.1-11, 2006.
DOI : 10.1007/11761679_1

C. Delerablée, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt 2007, pp.200-215, 2007.
DOI : 10.1007/978-3-540-76900-2_12

Y. Dodis and A. Yampolskiy, A Verifiable Random Function with Short Proofs and Keys, PKC 2005, pp.416-431, 2005.
DOI : 10.1007/978-3-540-30580-4_28

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

M. Izabachène, B. Libert, and D. Vergnaud, Blockwise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, IMACC 2011, pp.431-450, 2011.

J. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, pp.146-162

A. Lewko, A. Sahai, and B. Waters, Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, pp.273-285, 2010.
DOI : 10.1109/SP.2010.23

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt 2010, pp.62-91, 2010.
DOI : 10.1007/978-3-642-13190-5_4

A. Lewko and B. Waters, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, 2010.
DOI : 10.1007/978-3-540-78967-3_9

B. Libert, S. C. Ramanna, and M. Yung, Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions (Full Version) Available from https, ICALP 2016, 2016.

B. Libert and M. Yung, Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, TCC 2010, pp.499-517, 2010.
DOI : 10.1007/11426639_7

M. Naor, On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003.
DOI : 10.1007/978-3-540-45146-4_6

M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, pp.1-20, 1962.

T. Okamoto and K. Takashima, Hierarchical Predicate Encryption for Inner-Products, Asiacrypt'09, pp.214-231, 2009.
DOI : 10.1007/978-3-642-10366-7_13

T. Okamoto and K. Takashima, Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, pp.191-208, 2010.
DOI : 10.1007/978-3-642-14623-7_11

T. Okamoto and K. Takashima, Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption, Euro- crypt'12, pp.591-608, 2012.

T. Okamoto and K. Takashima, Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, Asi- acrypt'12, pp.349-366, 2012.
DOI : 10.1007/978-3-642-34961-4_22

T. Okamoto and K. Takashima, Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption. Designs, Codes and Cryptography 77, pp.2-3, 2015.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005.
DOI : 10.1007/11426639_27

E. Shen, E. Shi, and B. Waters, Predicate Privacy in Encryption Systems, TCC'09, pp.457-473, 2009.
DOI : 10.1007/978-3-642-00457-5_27

B. Waters, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, CRYPTO 2009, pp.619-636, 2009.
DOI : 10.1007/978-3-642-03356-8_36

H. Wee, Threshold and Revocation Cryptosystems via Extractable Hash Proofs, Eurocrypt 2011, pp.589-609, 2011.
DOI : 10.1007/978-3-642-20465-4_32

H. Wee, Dual System Encryption via Predicate Encodings, TCC 2014, pp.616-637, 2014.
DOI : 10.1007/978-3-642-54242-8_26

URL : https://hal.archives-ouvertes.fr/hal-01094703

S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, A Framework and Compact Constructions for Nonmonotonic Attribute-Based Encryption, PKC 2014, pp.275-292, 2016.