A. Ambrona, G. Barthe, and B. Schmidt, Generic Transformations of Predicate Encodings: Constructions and Applications, CRYPTO 2017, pp.36-66, 2017.
DOI : 10.1007/978-3-642-54242-8_26

A. , S. Agrawal, and M. Chase, A study of pair encodings: Predicate encryption in prime order groups, TCC 2016-A, Part II, pp.259-288, 2016.

A. , S. Agrawal, and M. Chase, Simplifying design and analysis of complex predicate encryption schemes A framework for identity-based encryption with almost tight security, Advances in Cryptology - EUROCRYPT 2017, Part I AHY15. Nuttapong Attrapadung, Goichiro Hanaoka, and Shota Yamada ASI- ACRYPT 2015, pp.627-656, 2015.

A. , N. Attrapadung, and B. Libert, Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, pp.384-402, 2010.
DOI : 10.1007/978-3-642-13013-7_23

N. Attrapadung, Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, EUROCRYPT 2014, pp.557-577
DOI : 10.1007/978-3-642-55220-5_31

A. and N. Attrapadung, Dual system encryption framework in primeorder groups via computational pair encodings, ASIACRYPT 2016, Part II, pp.591-623, 2016.
DOI : 10.1007/978-3-662-53890-6_20

A. , N. Attrapadung, and S. Yamada, Duality in ABE: Converting attribute based encryption for dual predicate and dual policy via computational encodings, CT-RSA 2015, pp.87-105
DOI : 10.1007/978-3-319-16715-2_5

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

D. Bb04b, X. Boneh, and . Boyen, Secure identity based encryption without random oracles, CRYPTO 2004, pp.443-459

H. D. Springer, X. Boneh, E. Boyen, and . Goh, Hierarchical identity based encryption with constant size ciphertext, EUROCRYPT 2005, pp.440-456, 2004.

D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, CRYPTO 2001, pp.213-229
DOI : 10.1137/s0097539701398521

URL : http://eprint.iacr.org/2001/090.ps.gz

H. Springer, (Hierarchical) identity-based encryption from affine message authentication Ciphertext-policy attribute-based encryption Functional encryption: Definitions and challenges, CRYPTO 2014, Part I IEEE Symposium on Security and Privacy BSW11. Dan Boneh, Amit Sahai, and Brent Waters TCC 2011, pp.408-425, 2001.

J. Chen, R. Gay, and H. Wee, Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, EUROCRYPT 2015, Part II, pp.595-624, 2015.
DOI : 10.1007/978-3-662-46803-6_20

URL : https://hal.archives-ouvertes.fr/hal-01220358

J. Chen, J. Gong, J. Halevi, and J. Katz, Tightly secure IBE under constant-size master public key A forward-secure public-key encryption scheme, Public-Key Cryptography -PKC 2017, Part I EUROCRYPT 2003, pp.207-231, 2003.
DOI : 10.1007/978-3-662-54365-8_9

J. Chen and H. Wee, Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula, SCN 14, pp.277-297, 2014.
DOI : 10.1007/978-3-319-10879-7_16

URL : https://eprint.iacr.org/2014/465.pdf

E. Escala, G. Herold, E. Kiltz, C. R. , and J. Villar, An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, pp.129-147, 2013.
DOI : 10.1007/978-3-642-40084-1_8

URL : http://eprint.iacr.org/2013/377.pdf

G. J. Gong, X. Dong, J. Chen, and Z. Cao, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, ASIACRYPT 2016, Part II, pp.624-654
DOI : 10.1007/978-3-642-54242-8_26

G. and C. Gentry, Practical Identity-Based Encryption Without Random Oracles, LNCS, vol.32, issue.3, pp.445-464, 2006.
DOI : 10.1007/11426639_7

URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2330/2330.pdf

G. , R. Gay, D. Hofheinz, E. Kiltz, and H. Wee, Tightly CCAsecure encryption without pairings, EUROCRYPT 2016, Part I, pp.1-27, 2016.
DOI : 10.1007/978-3-662-49890-3_1

URL : https://hal.archives-ouvertes.fr/hal-01302516

R. Goyal, V. Koppula, and B. Waters, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, TCC 2016-B, Part II, pp.361-388, 2016.
DOI : 10.1109/SFCS.1986.25

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attributebased encryption for fine-grained access control of encrypted data Shorter quasi-adaptive NIZK proofs for linear subspaces, ACM CCS 06 ASIACRYPT 2013, pp.89-98, 2006.

K. Kim, W. Susilo, F. Guo, M. H. Au, and S. Nepal, An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, pp.823-834, 2017.
DOI : 10.1109/TrustCom.2012.136

K. Kim, W. Susilo, F. Guo, and M. H. Au, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, SCN 16, pp.3-22, 2016.
DOI : 10.1007/978-3-642-54242-8_26

J. Katz, A. Sahai, and B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, EURO- CRYPT 2008, pp.146-162, 2008.
DOI : 10.1007/s00145-012-9119-4

L. B. Allison, T. Lewko, A. Okamoto, K. Sahai, B. Takashima et al., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, EURO- CRYPT 2010, pp.62-91, 2010.

A. B. Lewko and B. Waters, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, pp.455-479, 2010.
DOI : 10.1007/978-3-540-78967-3_9

URL : http://eprint.iacr.org/2009/482.pdf

A. B. Lewko and B. Waters, New proof methods for attributebased encryption: Achieving full security through selective techniques Attribute-based encryption with non-monotonic access structures, CRYPTO 2012 OSW07. Rafail Ostrovsky, Amit Sahai, and Brent Waters ACM CCS 07, pp.180-198, 2007.

T. Okamoto and K. Takashima, Fully secure functional encryption with general relations from the decisional linear assumption Adaptively attribute-hiding (hierarchical) inner product encryption, CRYPTO 2010 EUROCRYPT 2012, pp.191-208, 2010.
DOI : 10.1007/978-3-642-14623-7_11

URL : https://eprint.iacr.org/2010/563.pdf

C. Somindu and . Ramanna, More efficient constructions for inner-product encryption Sanjit Chatterjee, and Palash Sarkar. Variants of waters' dual system primitives using asymmetric pairings -(extended abstract) Efficient (anonymous) compact HIBE from standard assumptions, ACNS 16 PKC 2012 RS14. Somindu C. Ramanna and Palash Sarkar ProvSec 2014 RS16. Somindu C. Ramanna and Palash Sarkar, pp.231-248, 2012.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, LNCS, vol.84, issue.196, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf

A. Sahai and B. R. Waters, Fuzzy Identity-Based Encryption, EUROCRYPT 2005, pp.457-473, 2005.
DOI : 10.1007/11426639_27

E. Shi and B. Waters, Delegating Capabilities in Predicate Encryption Systems, Part II LNCS, vol.5126, pp.560-578, 2008.
DOI : 10.1007/978-3-540-70583-3_46

URL : http://eprint.iacr.org/2008/279.pdf

R. Brent and . Waters, Efficient identity-based encryption without random oracles, EUROCRYPT 2005, pp.114-127

W. and B. Waters, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, CRYPTO 2009, pp.619-636, 2009.
DOI : 10.1007/978-3-642-03356-8_36

URL : http://eprint.iacr.org/2009/385.pdf

W. and B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, PKC 2011, pp.53-70, 2011.
DOI : 10.1007/978-3-642-19379-8_4

W. and H. Wee, Dual System Encryption via Predicate Encodings, TCC 2014, pp.616-637, 2014.
DOI : 10.1007/978-3-642-54242-8_26

URL : https://hal.archives-ouvertes.fr/hal-01094703

W. , H. Wee, Q. Déjà, !. Encore, and I. Un-petit, New revocable IBE in prime-order groups: Adaptively secure, decryption key exposure resistant, and with short public parameters, TCC 2016-A, Part II Topics in Cryptology -CT-RSA 2017, pp.237-258, 2016.

Y. Watanabe and J. Shikata, Identity-based hierarchical keyinsulated encryption without random oracles, PKC 2016, Part I, pp.255-279, 2016.
DOI : 10.1007/978-3-662-49384-7_10