M. Abdalla, M. Bellare, and G. Neven, Robust Encryption In: Theory of Cryptography, pp.480-497, 2010.

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: An Online Social Network with User-Defined Privacy, p.SIGCOMM, 2009.

M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval, Key-Privacy in Public-Key Encryption, pp.566-582, 2001.
DOI : 10.1007/3-540-45682-1_33

O. Bodriagov, G. Kreitz, and S. Buchegger, Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.622-628, 2014.
DOI : 10.1109/PerComW.2014.6815278

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The Second-Generation Onion Router, USENIX Security Symposium, pp.303-320, 2004.
DOI : 10.21236/ADA465464

A. Fiat and M. Naor, Broadcast Encryption, CRYPTO'93, pp.480-491, 1994.
DOI : 10.1007/3-540-48329-2_40

M. Harbach, S. Fahl, M. Brenner, T. Muders, and M. Smith, Towards privacypreserving access control with hidden policies, hidden credentials and hidden decisions, Privacy, Security and Trust (PST), pp.17-24, 2012.

S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia, DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012.
DOI : 10.1109/PerComW.2012.6197504

B. Libert, K. G. Paterson, and E. A. Quaglia, Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, PKC 2012, pp.206-224, 2012.
DOI : 10.1007/978-3-642-30057-8_13

S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia, Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, pp.337-348, 2012.
DOI : 10.1145/2413176.2413215