M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, EUROCRYPT '98. Volume 1403, pp.127-144, 1998.
DOI : 10.1007/BFb0054122

R. Johnson, D. Molnar, D. Song, and D. Wagner, Homomorphic Signature Schemes, LNCS, vol.2271, pp.244-262, 2002.
DOI : 10.1007/3-540-45760-7_17

F. Hörandner, S. Krenn, A. Migliavacca, F. Thiemer, and B. Zwattendorfer, CRE- DENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing, In: Availability, Reliability and Trust ? SECPID@ARES, pp.2016-742, 2016.

S. Cantor, J. Kemp, R. Philpott, and E. Maler, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2 .0 -Errata Composite, OASIS, 2009.

N. Sakimura, J. Bradley, M. Jones, B. De-medeiros, and C. Mortimore, OpenID Connect Core 1.0, OpenID, 2014.

M. Breen, Nothing to hide: Why metadata should be presumed relevant, Kansas Law Review, Kansas Law Review Inc, vol.2, issue.562, 2008.

C. Conley, Metadata: Piecing together a privacy solution Available at SSRN:https://ssrn.com, 2008.
DOI : 10.2139/ssrn.2573962

B. Greschbach, G. Kreitz, and S. Buchegger, The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.333-339, 2012.
DOI : 10.1109/PerComW.2012.6197506

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998.
DOI : 10.1145/293347.293350

E. Kushilevitz and R. Ostrovsky, Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997.
DOI : 10.1109/SFCS.1997.646125

URL : http://www.math.umd.edu/~schmoyer/456/pir-1db.ps

J. Camenisch, M. Dubovitskaya, G. Neven, and G. M. Zaverucha, Oblivious Transfer with Hidden Access Control Policies, LNCS, vol.6571, pp.192-209, 2011.
DOI : 10.1007/978-3-642-19379-8_12

J. Camenisch, M. Dubovitskaya, R. R. Enderlein, and G. Neven, Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption, LNCS, vol.7485, pp.559-579, 2012.
DOI : 10.1007/978-3-642-32928-9_31

O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious RAMs, Journal of the ACM, vol.43, issue.3, pp.431-473, 1996.
DOI : 10.1145/233551.233553

URL : ftp://ftp.icsi.berkeley.edu/pub/techreports/1993/tr-93-072.ps.gz

B. Pinkas and T. Reinman, Oblivious ram revisited Advances in Cryptology ? CRYPTO 2010: 30th Annual Cryptology Conference, Proceedings, pp.502-519, 2010.

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

URL : http://www.cs.ru.nl/~jhh/pub/secsem/chaum1985bigbrother.pdf

J. Camenisch and E. V. Herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, LNCS, vol.2045, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

URL : http://www.iacr.org/archive/eurocrypt2001/20450093.pdf

C. Paquin and G. Zaverucha, U-prove Cryptographic Specification v1, 2013.

S. Krenn, A. Salzer, and C. Striecks, Attribute-based credentials on encrypted attributes, 2016.

M. Bellare and O. Goldreich, On Defining Proofs of Knowledge, LNCS, vol.740, pp.390-420, 1992.
DOI : 10.1007/3-540-48071-4_28