N. Attrapadung and H. Imai, Conjunctive Broadcast and Attribute-Based Encryption Pairing-based Cryptography, LNCS, vol.5671, pp.248-265, 2009.
DOI : 10.1007/978-3-642-03298-1_16

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among Notions of Security for Public-key Encryption Schemes Advances in Cryptology, Proc. of Crypto'98, pp.26-45, 1998.

A. Fiat and M. Naor, Broadcast Encryption Advances in Cryptology, Proc.of Crypto'93, pp.480-491, 1994.

M. T. Goodrich, J. Z. Sun, and R. Tamassia, Efficient tree-based revocation in groups of low-state devices Advances in Cryptology, Proc. of CRYPTO '04, pp.511-527, 2004.

D. Halevy and A. Shamir, Advances in Cryptology, Proc. of CRYPTO '02, pp.41-62, 2002.

J. Kubiatowicz, D. Bindel, and Y. Chen, Oceanstore: An architecture for globalscale persistent

K. Kurosawa and Y. Desmedt, Optimum traitor tracing and asymmetric schemes Advances in Cryptology, Proc. of Eurocrypt'98, pp.145-157, 1998.
DOI : 10.1007/bfb0054123

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.27.6042

J. Li, K. Ren, and K. Kim, A 2 BE: Accountable Attribute-based Encryption for Abuse Free Access Control, Cryptology ePrint Archive Report, p.118, 2009.

J. S. Millstein, M. King, &. Morrison, and L. Foerster, Cloud Computing and Outsourcing: Is Data Lost in the Fog, 2009.

A. A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen, Ivy: A read/write peer-topeer file system, Proceedings of OSDI'02, pp.31-44, 2002.

P. Maniatis, M. Roussopoulos, T. Giuli, D. Rosenthal, M. Baker et al., The LOCKSS peer-to-peer digital preservation system, ACM Transactions on Computer Systems, vol.23, issue.1, pp.2-50, 2005.
DOI : 10.1145/1047915.1047917

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.3373

D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, Advances in Cryptology,Proc. of Crypto'01, pp.41-62, 2001.
DOI : 10.1007/3-540-44647-8_3

C. Delerablée, P. Paillier, and D. Pointcheval, Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Ciphertexts, Pairing 07, pp.39-59, 2007.

A. Sahai and B. Waters, Revocation Systems with Very Small Private Keys, Cryptology ePrint Archive Report, p.309, 2008.

A. Y. Yumerefendi and J. Chase, Strong accountability for network storage, Proc. of FAST'07, 2007.
DOI : 10.1145/1288783.1288786