N. Attrapadung and H. Imai, Conjunctive Broadcast and Attribute-Based Encryption, pp.248-265, 2009.
DOI : 10.1007/11426639_27

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

A. Boldyreva, V. Goyal, and V. Kumar, Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008.
DOI : 10.1145/1455770.1455823

M. Chase and S. S. Chow, Privacy-aware attribute-based encryption with user accountability, pp.121-130, 2009.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

A. Kapadia, P. P. Tsang, and S. W. Smith, Attribute-based publishing with hidden credentials and hidden policies, pp.179-192, 2007.

J. Li, K. Ren, B. Zhu, and Z. Wan, Privacy-Aware Attribute-Based Encryption with User Accountability, pp.347-362, 2009.
DOI : 10.1007/3-540-48405-1_34

J. W. Li, J. Li, X. F. Chen, C. F. Jia, and Z. L. Liu, Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud, pp.490-502, 2012.
DOI : 10.1007/978-3-642-34601-9_37

H. Lin, Z. Cao, X. Liang, and J. Shao, Secure threshold multi authority attribute based encryption without a central authority???, Information Sciences, vol.180, issue.13, pp.2618-2632, 2010.
DOI : 10.1016/j.ins.2010.03.004

D. Lubicz and T. Sirvent, Attribute-Based Broadcast Encryption Scheme Made Efficient, pp.325-342, 2008.
DOI : 10.1007/978-3-540-68164-9_22

URL : https://hal.archives-ouvertes.fr/hal-00378805

T. Nishide, K. Yoneyama, and K. Ohta, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, pp.111-129, 2008.
DOI : 10.1007/978-3-540-68914-0_7

T. Okamoto, K. Takashima, and M. Electric, Adaptively attribute-hiding (hierarchical ) inner pro duct encryption, pp.591-608, 2012.
DOI : 10.1007/978-3-642-29011-4_35

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with nonmonotonic access structures, pp.195-203, 2007.

B. Parno, M. Raykova, and V. Vaikuntanathan, How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, pp.422-439, 2012.
DOI : 10.1007/978-3-642-28914-9_24

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, pp.457-473, 2005.
DOI : 10.1007/11426639_27

X. X. Xie, H. Ma, J. Li, and X. F. Chen, New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, pp.373-382, 2013.
DOI : 10.1007/978-3-642-36818-9_41

URL : https://hal.archives-ouvertes.fr/hal-01480196