D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Lecture Notes in Computer Science, vol.403, pp.319-327, 1990.
DOI : 10.1007/0-387-34799-2_25

M. Bellare and B. S. Yee, Forward integrity for secure audit logs, 1997.

M. Bellare and B. Yee, Forward-Security in Private-Key Cryptography, Topics in Cryptology ? CT-RSA 2003. Volume 2612 of Lecture Notes in Computer Science, pp.1-18, 2003.
DOI : 10.1007/3-540-36563-X_1

B. Schneier and J. Kelsey, Cryptographic support for secure logs on untrusted machines, Proceedings of the 7th Conference on USENIX Security Symposium - Volume 7. SSYM'98, pp.4-4, 1998.

S. Haber and W. Stornetta, How to time-stamp a digital document, Journal of Cryptology, vol.3, issue.2, pp.99-111, 1991.

D. L. Métayer, E. Mazza, and M. L. Potet, Designing Log Architectures for Legal Evidence, 2010 8th IEEE International Conference on Software Engineering and Formal Methods, pp.156-165, 2010.
DOI : 10.1109/SEFM.2010.29

D. Butin, M. Chicote, and D. L. Metayer, Log Design for Accountability, 2013 IEEE Security and Privacy Workshops, pp.1-7, 2013.
DOI : 10.1109/SPW.2013.26

URL : https://hal.archives-ouvertes.fr/hal-00799100

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of the 28th international conference on Very Large Data Bases, VLDB Endowment, pp.143-154, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

O. 'hara and K. , Transparent government, not transparent citizens: a report on privacy and transparency for the cabinet office, 2011.

T. Pulls, R. Peeters, and K. Wouters, Distributed privacy-preserving transparency logging, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.83-94, 2013.
DOI : 10.1145/2517840.2517847

T. Pulls and L. Martucci, D:D-5.2 User-Centric Transparency Tools, p.4, 2014.

J. Camenisch, T. Groß, and T. Heydt-benjamin, Accountable privacy supporting services, Identity in the Information Society, vol.4, issue.3, pp.241-267, 2009.
DOI : 10.1007/BF00196725

U. Flegel, Privacy-respecting intrusion detection, 2007.

L. Øverlier, T. Brekne, and A. Arnes, Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring, Cryptology and Network Security, pp.261-273, 2005.
DOI : 10.1007/11599371_22

U. Flegel, Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity, Proceedings of SSZ. Volume Lecture Notes in Informatics, no. P-62., GI SIGs SIDAR and PET, pp.221-232, 2005.

H. Hedbom, T. Pulls, P. Hjärtquist, and A. Lavén, Adding Secure Transparency Logging to the PRIME Core, Privacy and Identity Management for Life IFIP Advances in Information and Communication Technology, pp.299-314, 2010.
DOI : 10.1007/978-3-642-14282-6_25

URL : https://hal.archives-ouvertes.fr/hal-01061061

T. Rübsamen, C. Reich, A. Taherimonfared, T. Wlodarczyk, and C. Rong, Evidence for accountable cloud computing services, Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), Citeseer, 2013.

M. Nicolett and K. M. Kavanagh, Critical capabilities for security information and event management technology, Gartner Report, 2011.

N. P. Smart, Cryptography: an introduction, 2003.

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Public Key Cryptography ? PKC 2011, pp.53-70, 2011.
DOI : 10.1007/978-3-642-19379-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719

B. Parno, M. Raykova, and V. Vaikuntanathan, How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption, Theory of Cryptography, pp.422-439, 2012.
DOI : 10.1007/978-3-642-28914-9_24

A. Sahai, H. Seyalioglu, and B. Waters, Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption, Cryptology ePrint Archive Report, vol.2012437, 2012.
DOI : 10.1007/978-3-642-32009-5_13

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006.
DOI : 10.1145/1127345.1127346

R. Canetti and S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.185-194, 2007.
DOI : 10.1145/1315245.1315269

J. Weng, R. H. Deng, X. Ding, C. K. Chu, and J. Lai, Conditional proxy reencryption secure against chosen-ciphertext attack, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp.322-332, 2009.

J. Weng, Y. Yang, Q. Tang, R. H. Deng, and F. Bao, Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security, pp.151-166, 2009.
DOI : 10.1007/3-540-44598-6_14

R. Cramer, I. Damgård, and U. Maurer, General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, Advances in Cryptology ? EUROCRYPT, pp.316-334, 2000.
DOI : 10.1007/3-540-45539-6_22