Y. Desmedt, Society and Group Oriented Cryptography: a New Concept, Advances in Cryptology, CRYPTO'87, pp.120-127, 1987.
DOI : 10.1007/3-540-48184-2_8

C. Gentry, Certificate-Based Encryption and the Certificate Revocation Problem, Lecture Notes in Computer Science, vol.2656, pp.272-293, 2003.
DOI : 10.1007/3-540-39200-9_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.2805

B. G. Kang, J. H. Park, and S. G. Hahn, A Certificate-Based Signature Scheme, Lecture Notes in Computer Science, vol.2964, pp.99-111, 2004.
DOI : 10.1007/978-3-540-24660-2_8

J. Baek and Y. Zheng, Identity-Based Threshold Decryption, Proceedings of PKC'04, pp.262-276, 2004.
DOI : 10.1007/978-3-540-24632-9_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878

Y. Long, K. Chen, and S. Liu, ID-based threshold decryption secure against adaptive chosen-ciphertext attack, Computers & Electrical Engineering, vol.33, issue.3, pp.166-176, 2007.
DOI : 10.1016/j.compeleceng.2006.11.003

T. Chang, An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks, Computer Communications, vol.32, issue.17, pp.1829-1836, 2009.
DOI : 10.1016/j.comcom.2009.07.005

H. Liu, W. Xie, J. Yu, P. Zhang, and S. Liu, A general threshold encryption scheme based on new secret sharing measure, 2011 6th IEEE Conference on Industrial Electronics and Applications, pp.21-23, 2011.
DOI : 10.1109/ICIEA.2011.5975962

C. Xu, J. Zhou, and G. Xiao, General Group Oriented ID-Based Cryptosystems with Chosen Plaintext Security, International Journal of Network Security, vol.6, issue.1, pp.1-5, 2008.

Y. Sang, J. Zeng, Z. Li, and L. You, A Secret Sharing Scheme with General Access Structures and its Applications, International Journal of Advancements in Computing Technology, vol.3, issue.4, pp.121-128, 2011.

Y. Long and C. Ke-fei, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, vol.2, issue.2, pp.111-113, 2006.

R. Sakai and M. Kasahara, ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive Report, p.54, 2003.

E. Fujisaki and T. Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes, Proceedings of CRYPTO '99, pp.537-554, 1999.
DOI : 10.1007/3-540-48405-1_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.5980

B. Lynn, PBC Library Specification

S. Al-riyami and K. Paterson, Certificateless Public Key Cryptography, Advances in Cryptology -AsiaCrypt, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Proceedings of Advances in Cryptology ? Eurocrypt 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446

L. Chen and Z. Cheng, Security proof of Sakai-Kasahar's identity-based encryption scheme, Proceedings of Cryptography and Coding 2005, pp.442-459, 2005.
DOI : 10.1007/11586821_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.3315

V. Daza, J. Herranz, P. Morillo, and C. Ràfols, Extensions of access structures and their cryptographic applications, Applicable Algebra in Engineering, Communication and Computing, vol.32, issue.3, pp.257-284, 2010.
DOI : 10.1007/s00200-010-0125-1

G. J. Simmons, How to (Really) Share a Secret, Advances in Cryptology -CRYPTO 88, pp.390-448, 1990.
DOI : 10.1007/0-387-34799-2_30

J. Benaloh and J. Leichter, Generalized secret sharing and monotone functions Advances in Cryptology -CRYPTO '88, LCNS No 403, pp.27-35, 1990.
DOI : 10.1007/0-387-34799-2_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.698.1352

Y. Zheng, T. Hardjono, and J. Seberry, Reusing Shares in Secret Sharing Schemes, The Computer Journal, vol.37, issue.3, pp.199-205, 1994.
DOI : 10.1093/comjnl/37.3.199

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.1444

K. Kitae, S. Lim, I. Yie, and K. Kim, Cryptanalysis of a Dynamic Threshold Decryption Scheme, Communications of the Korean Mathematical Society, vol.24, issue.1, pp.153-159, 2009.