G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, CRYPTO '00, pp.255-270, 2000.
DOI : 10.1007/3-540-44598-6_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.7942

M. Bellare, A. Boldyreva, K. Kurosawa, and J. Staddon, Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security, IEEE Transactions on Information Theory, vol.53, issue.11, pp.3927-3943, 2007.
DOI : 10.1109/TIT.2007.907471

M. Bellare, A. Boldyreva, and A. Neill, Deterministic and Efficiently Searchable Encryption, CRYPTO 2007, pp.535-552, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-74143-5_30.pdf

Y. Lindell, Anonymous Authentication, JPC, vol.2, issue.2, 2011.

R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, ASIACRYPT '01, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

S. Schechter, T. Parnell, and A. Hartemink, Anonymous Authentication of Membership in Dynamic Groups, FC '99, pp.184-195, 1999.
DOI : 10.1007/3-540-48390-X_14

D. Slamanig and S. Rass, Anonymous But Authorized Transactions Supporting Selective Traceability, SECRYPT '10, pp.132-141, 2010.

D. Slamanig, P. Schartner, and C. Stingl, Practical Traceable Anonymous Identification, SECRYPT '09, pp.225-232, 2009.