N. Attrapadung, B. Libert, and E. De-panafieu, Expressive key-policy attributebased encryption with constant-size ciphertexts, PKC 2011, pp.90-108, 2011.
DOI : 10.1007/978-3-642-19379-8_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.680.2516

D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, LNCS, vol.2139, pp.213-229, 2001.

D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko et al., Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits, EUROCRYPT 2014, pp.533-556, 2014.
DOI : 10.1007/978-3-642-55220-5_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.453.9488

C. Chen, J. Chen, H. W. Lim, Z. Zhang, D. Feng et al., Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures, CT-RSA 2013, pp.50-67, 2013.
DOI : 10.1007/978-3-642-36095-4_4

J. Chotard, D. H. Phan, and D. Pointcheval, Homomorphic-policy attribute-based key encapsulation mechanisms, Cryptology ePrint Archive, 1089.
URL : https://hal.archives-ouvertes.fr/hal-01402517

A. Fiat and M. Naor, Broadcast Encryption, CRYPTO'93, pp.480-491, 1994.
DOI : 10.1007/3-540-48329-2_40

S. Gorbunov, V. Vaikuntanathan, and H. Wee, Attribute-based encryption for circuits, 45th ACM STOC, pp.545-554, 2013.

V. Goyal, A. Jain, O. Pandey, and A. Sahai, Bounded Ciphertext Policy Attribute Based Encryption, Part II LNCS, vol.5126, pp.579-591, 2008.
DOI : 10.1007/978-3-540-70583-3_47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.3232

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

J. Herranz, F. Laguillaumie, and C. Ràfols, Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC 2010, pp.19-34, 2010.
DOI : 10.1007/978-3-642-13013-7_2

URL : https://hal.archives-ouvertes.fr/hal-01083535

A. B. Lewko and B. Waters, Decentralizing Attribute-Based Encryption, LNCS, vol.6632, pp.568-588, 2011.
DOI : 10.1007/978-3-642-20465-4_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.5899

V. Nikov and S. Nikova, New monotone span programs from old. Cryptology ePrint Archive, Report, vol.282282, 2004.
DOI : 10.1007/978-3-540-30598-9_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.780

T. Okamoto and K. Takashima, Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, ASIACRYPT 2012, pp.349-366, 2012.
DOI : 10.1007/978-3-642-34961-4_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.258.5317

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with nonmonotonic access structures, ACM CCS 07, pp.195-203, 2007.

Y. Rouselakis and B. Waters, Practical constructions and new proof methods for large universe attribute-based encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.463-474, 2013.
DOI : 10.1145/2508859.2516672

A. Sahai and B. R. Waters, Fuzzy Identity-Based Encryption, LNCS, vol.3494, pp.457-473, 2005.
DOI : 10.1007/11426639_27

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, LNCS, vol.84, issue.196, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf

S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro, A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, LNCS, vol.8383, pp.275-292, 2014.
DOI : 10.1007/978-3-642-54631-0_16