M. Abe and S. Fehr, Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography, Crypto '04, pp.317-334, 2004.
DOI : 10.1007/978-3-540-28628-8_20

M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, Structure-preserving signatures and commitments to group elements, Crypto '10, pp.209-236, 2010.

M. Abe, K. Haralambiev, and M. Ohkubo, Signing on elements in bilinear groups for modular protocol design, Cryptology ePrint Archive, 2010.

J. Almansa, I. Damgård, and J. Nielsen, Simplified Threshold RSA with Adaptive and Proactive Security, Eurocrypt '06, pp.593-611, 2006.
DOI : 10.1007/11761679_35

P. Barreto and M. Naehrig, Pairing-Friendly Elliptic Curves of Prime Order, SAC '05, pp.319-331, 2005.
DOI : 10.1007/11693383_22

M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya et al., Randomizable Proofs and Delegatable Anonymous Credentials, Crypto '09, pp.108-125, 2009.
DOI : 10.1007/978-3-642-03356-8_7

M. Bellare, C. Namprempre, and G. Neven, Unrestricted Aggregate Signatures, ICALP '07, pp.411-422, 2007.
DOI : 10.1007/978-3-540-73420-8_37

M. Bellare and T. Ristenpart, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters??? IBE Scheme, Eurocrypt '09, pp.407-424, 2009.
DOI : 10.1007/11426639_7

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, PKC '03, pp.31-46, 2003.
DOI : 10.1007/3-540-36288-6_3

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, Crypto '04, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh and M. Franklin, Efficient Generation of shared RSA keys, Crypto '97, pp.425-439, 1924.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Eurocrypt '03, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairing, Earlier version in Asiacrypt '01, pp.297-319, 2001.

C. Boyd, Digital Multisignatures, Cryptography and Coding, pp.241-246, 1989.

R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Adaptive Security for Threshold Cryptosystems, Crypto '99, pp.98-115, 1999.
DOI : 10.1007/3-540-48405-1_7

R. Canetti and S. Goldwasser, An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), Eurocrypt '99, pp.90-106, 1999.
DOI : 10.1007/3-540-48910-X_7

J. Chen, H. Lim, S. Ling, H. Wang, and H. Wee, Shorter IBE and Signatures via Asymmetric Pairings, Pairing '12, pp.122-140, 2012.
DOI : 10.1007/978-3-642-36334-4_8

J. Coron, On the Exact Security of Full Domain Hash, Crypto '00, pp.229-235, 2000.
DOI : 10.1007/3-540-44598-6_14

V. Cortier, D. Galindo, S. Glondu, and M. Izabachène, Distributed ElGamaì a la Pedersen: Application to Helios, WPES '13, pp.131-142, 2013.

R. Cramer, M. Franklin, B. Schoenmakers, and M. Yung, Multi-autority secret-ballot elections with linear work, Eurocrypt '96, pp.72-83, 1996.

R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, Eurocrypt '97, pp.103-118, 1997.
DOI : 10.1007/3-540-69053-0_9

R. Cramer, I. Damgård, and J. Nielsen, Multiparty computation from threshold homomorphic encryption, Eurocrypt '01, pp.280-299, 2001.

R. Cramer, I. Damgård, S. Dziembowski, M. Hirt, and T. Rabin, Efficient multi-party computations secure against an adaptive adversary, Eurocrypt '99, pp.311-326, 1999.

I. Damgård and G. Mikkelsen, Efficient, Robust and Constant-Round Distributed RSA Key Generation, TCC '10, pp.183-200, 2010.
DOI : 10.1145/359168.359176

A. Dent, A Note On Game-Hopping Proofs. Cryptology ePrint Archive, Report, vol.260, 2006.

A. De-santis, Y. Desmedt, Y. Frankel, and M. Yung, How to share a function securely, Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.522-533, 1994.
DOI : 10.1145/195058.195405

Y. Desmedt, Society and Group Oriented Cryptography: a New Concept, Crypto '87, pp.120-127, 1987.
DOI : 10.1007/3-540-48184-2_8

Y. Desmedt and Y. , Threshold cryptosystems, Crypto '89, pp.307-315, 1990.

P. Feldman, A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987.
DOI : 10.1109/SFCS.1987.4

P. Fouque and J. Stern, Fully Distributed Threshold RSA under Standard Assumptions, Asiacrypt '01, pp.310-330, 2001.
DOI : 10.1007/3-540-45682-1_19

URL : https://hal.archives-ouvertes.fr/inria-00565271

Y. Frankel, P. Mackenzie, and M. Yung, Robust efficient distributed RSA-key generation, STOC '98, pp.663-672, 1998.
DOI : 10.1145/277697.277779

Y. Frankel, P. Mackenzie, and M. Yung, Adaptively-secure distributed public-key systems, ESA '99, pp.4-27, 1999.

Y. Frankel, P. Mackenzie, and M. Yung, Adaptively-Secure Optimal-Resilience Proactive RSA, Asiacrypt '99, pp.180-194, 1999.
DOI : 10.1007/978-3-540-48000-6_15

Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung, Optimal-resilience proactive public-key cryptosystems, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.384-393, 1997.
DOI : 10.1109/SFCS.1997.646127

D. Freeman, Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups, Eurocrypt '10, pp.44-61, 2010.
DOI : 10.1007/978-3-642-13190-5_3

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust threshold DSS signatures, Eurocrypt '96, pp.354-371, 1996.
DOI : 10.1006/inco.2000.2881

URL : http://doi.org/10.1006/inco.2000.2881

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Robust and efficient sharing of RSA functions, Crypto '96, pp.157-172, 1996.

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure distributed key generation for discrete-log based cryptosystems, Eurocrypt '99, pp.295-310, 1999.

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure Applications of Pedersen???s Distributed Key Generation Protocol, CT-RSA '03, pp.373-390, 2003.
DOI : 10.1007/3-540-36563-X_26

R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, vol.20, issue.1, pp.51-83, 2007.
DOI : 10.1007/s00145-006-0347-3

R. Gennaro, S. Halevi, H. Krawczyk, and T. Rabin, Threshold RSA for Dynamic and Ad-Hoc Groups, Eurocrypt '08, pp.88-107, 2008.
DOI : 10.1007/978-3-540-78967-3_6

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt '08, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, Crypto '95, pp.339-352, 1995.
DOI : 10.1007/3-540-44750-4_27

A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, Proactive public key and signature systems, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.100-110, 1997.
DOI : 10.1145/266420.266442

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., OceanStore: An architecture for global-scale persistent storage, ASPLOS '00, pp.190-201, 2000.

S. Jarecki and A. Lysyanskaya, Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures, Eurocrypt '00, pp.221-242, 2000.
DOI : 10.1007/3-540-45539-6_16

J. Katz and M. Yung, Threshold Cryptosystems Based on Factoring, Asiacrypt '02, pp.199-205, 2002.
DOI : 10.1007/3-540-36178-2_12

A. Lewko and B. Waters, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC '10, pp.455-479, 2010.
DOI : 10.1007/978-3-540-78967-3_9

A. Lewko, Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting, Eurocrypt '12, pp.318-351, 2012.
DOI : 10.1007/978-3-642-29011-4_20

B. Libert, T. Peters, M. Joye, and M. Yung, Linearly homomorphic structure-preserving signatures and their applications, Crypto '13, pp.289-307, 2013.

B. Libert and M. Yung, Adaptively secure non-interactive threshold cryptosystems, ICALP 2011, pp.76-100, 2011.
DOI : 10.1016/j.tcs.2013.01.001

B. Libert and M. Yung, Non-interactive CCA2-secure threshold cryptosystems with adaptive security: New framework and constructions, TCC '12, pp.75-93, 2012.

A. Lysyanskaya and C. Peikert, Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes, Asiacrypt '01, pp.331-350, 2001.
DOI : 10.1007/3-540-45682-1_20

T. Malkin, I. Teranishi, Y. Vahlis, and M. Yung, Signatures Resilient to Continual Leakage on Memory and Computation, TCC '11, pp.89-106, 2011.
DOI : 10.1007/978-3-642-19571-6_7

M. Naor and O. Reingold, Number-theoretic constructions of efficient pseudo-random functions, FOCS '97, pp.458-467, 1997.

T. Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Crypto '92, pp.31-53, 2011.
DOI : 10.1007/3-540-48071-4_3

R. Ostrovksy and M. Yung, How to withstand mobile virus attacks, PODC '91, pp.51-59, 1991.

T. Pedersen, A Threshold Cryptosystem without a Trusted Party, Eurocrypt '91, pp.522-526, 1991.
DOI : 10.1007/3-540-46416-6_47

T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Crypto '91, pp.129-140, 1991.
DOI : 10.1007/3-540-46766-1_9

T. Rabin, A simplified approach to threshold and proactive RSA, Crypto '98, pp.89-104, 1998.
DOI : 10.1007/BFb0055722

S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao et al., Pond: The OceanStore prototype, USENIX Workshop on File and Storage Technologies, 2003.

M. Scott, Authenticated ID-based key exchange and remote log-in with simple token and PIN number. Cryptology ePrint Archive, Report, vol.164, 2002.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

V. Shoup, Practical Threshold Signatures, Eurocrypt, pp.207-220, 2000.
DOI : 10.1007/3-540-45539-6_15

H. Wee, Threshold and Revocation Cryptosystems via Extractable Hash Proofs, Eurocrypt '11, pp.589-609, 2011.
DOI : 10.1007/978-3-642-20465-4_32

Z. Wang, H. Qian, and Z. Li, Adaptively secure threshold signature scheme in the standard model, In Informatica, vol.20, issue.4, pp.591-612, 2009.

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt '05, 2005.
DOI : 10.1007/11426639_7

B. Waters, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Crypto '09, pp.619-636, 2009.
DOI : 10.1007/978-3-642-03356-8_36