J. Hur and D. K. Noh, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.7, pp.1214-1221, 2011.
DOI : 10.1109/TPDS.2010.203

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

A. Boldyreva, V. Goyal, and V. Kumar, Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008.
DOI : 10.1145/1455770.1455823

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3047

M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure Attribute-Based Systems, Proc. ACM Conf. Computer and Comm. Security, 2006.
DOI : 10.3233/jcs-2009-0383

URL : http://doi.org/10.3233/jcs-2009-0383

S. Rafaeli and D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys, vol.35, issue.3, pp.309-329, 2003.
DOI : 10.1145/937503.937506

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application, Proc. Int'l Workshop Information Security Architecture (CSAW'07), 2007.
DOI : 10.1007/978-3-642-10838-9_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.6649

S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755720

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-Based Encryption with Non- Monotonoc Access Structures, Proc. ACM Conf. Computer and Comm. Security, pp.195-203, 2007.

X. Liang, R. Lu, X. Lin, and X. Shen, Ciphertext Policy Attribute Based Encryption with Efficient Revocation. technical report, 2011.

N. Attrapadung and H. Imai, Conjunctive Broadcast and Attribute-Based Encryption . Pairing '09, Proc.Int'l Conf.Palo Alto on Pairing-Based Cryptography, pp.248-265, 2009.
DOI : 10.1007/978-3-642-03298-1_16

Z. Zhou and D. Huang, Efficient and Secure Data Storage Operations for Mobile Cloud Computing, Cryptology ePrint Archive, vol.185, 2011.

B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Communications of the ACM, pp.53-70, 2011.
DOI : 10.1007/978-3-642-19379-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

J. Wang, H. Ma, Q. Tang, J. Lin, H. Zhu et al., A New Efficient Verifiable Fuzzy Keyword Search Scheme Journal of wireless mobile Networks, Ubiquitous Computing and Dependable Applications, pp.61-71, 2012.

Y. Zhao, X. Chen, H. Ma, Q. Tang, and H. Zhu, A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search, Journal of wireless mobile Networks, Ubiquitous Computing and Dependable Applications, pp.72-81, 2012.