S. Agrawal, D. Boneh, and X. Boyen, Efficient Lattice (H)IBE in the Standard Model, EURO- CRYPT, pp.553-572, 2010.
DOI : 10.1007/978-3-642-13190-5_28

M. Ajtai, Generating hard instances of lattice problems (extended abstract), Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.99-108, 1996.
DOI : 10.1145/237814.237838

J. Alwen and C. Peikert, Generating Shorter Bases for Hard Random Lattices, International Symposium on Theoretical Aspects of Computer Science, pp.75-86, 2009.
DOI : 10.1007/s00224-010-9278-3

URL : https://hal.archives-ouvertes.fr/inria-00359718

Y. Aono, X. Boyen, L. Trieu-phong, and L. Wang, Key-Private Proxy Re-encryption under LWE, Proc. of the 14th International Conference on Cryptology in India (INDOCRYPT 2013), pp.1-18, 2013.
DOI : 10.1007/978-3-319-03515-4_1

B. Applebaum, D. Cash, C. Peikert, and A. Sahai, Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems, Crypto, pp.595-618, 2009.
DOI : 10.1007/978-3-642-03356-8_35

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, 12th Annual Network and Distributed System Security Symposium, pp.29-35, 2005.
DOI : 10.1145/1127345.1127346

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, Eurocrypt, pp.360-363, 1998.
DOI : 10.1007/BFb0054122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246

D. Micciancio and S. Goldwasser, Complexity of Lattice Problems: A Cryptographic Perspective, 2002.
DOI : 10.1007/978-1-4615-0897-7

R. Lindner and C. Peikert, Better Key Sizes (and Attacks) for LWE-Based Encryption, CT-RSA, pp.319-339, 2011.
DOI : 10.1007/3-540-45708-9_19

O. Regev, On lattices, learning with errors, random linear codes, and cryptography, STOC, pp.84-93, 2005.

W. Peter and . Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, In SIAM Journal on Computing, pp.1484-1509, 1997.

K. Singh, C. Pandu-rangan, and A. K. Banerjee, Lattice based efficient threshold public key encryption scheme, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.93-107, 2013.

K. Singh, C. Pandu-rangan, and A. K. Banerjee, Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme, Journal of Internet Services and Information Security (JISIS), vol.3, issue.34, pp.38-51, 2013.
DOI : 10.1007/978-3-319-12060-7_6

K. Xagawa, Cryptography with Lattices, 2010.