S. Bcheri, N. Goetze, M. Orski, and H. Zwingelberg, D6.1 Application Description for the School Deployment, 2012.

S. A. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology ? EUROCRYPT 2001, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.6534

J. Camenisch and A. Lysyanskaya, A Signature Scheme with Efficient Protocols, Security in Communication Networks, pp.268-289, 2003.
DOI : 10.1007/3-540-36413-7_20

E. Verheul, Self-Blindable Credential Certificates from the Weil Pairing, Advances in Cryptology ? ASIACRYPT 2001, pp.533-551, 2001.
DOI : 10.1007/3-540-45682-1_31

P. Vullers and G. Alpár, Efficient Selective Disclosure on Smart Cards Using Idemix, 2013.
DOI : 10.1007/978-3-642-37282-7_5

URL : https://hal.archives-ouvertes.fr/hal-01470503