A. , S. Agrawal, and M. Chase, A study of pair encodings: Predicate encryption in prime order groups, 2016.

N. Attrapadung, G. Hanaoka, and S. Yamada, A Framework for Identity-Based Encryption with Almost Tight Security, 2003.
DOI : 10.1007/978-3-662-48797-6_22

A. and N. Attrapadung, Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, EUROCRYPT 2014, 2014.
DOI : 10.1007/978-3-642-55220-5_31

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT, 2004.
DOI : 10.1007/978-3-540-24676-3_14

D. Boneh and X. Boyen, Secure Identity Based Encryption Without Random Oracles, 2004.
DOI : 10.1007/978-3-540-28628-8_27

URL : http://theory.stanford.edu/~dabo/abstracts/../papers/sibewro.pdf

D. Boneh and M. Franklin, Identity-based encryption from the weil pairing, 2001.
DOI : 10.1137/s0097539701398521

URL : http://eprint.iacr.org/2001/090.ps.gz

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, TCC 2005, pp.8-14, 2005.
DOI : 10.1007/978-3-540-30576-7_18

O. Blazy, E. Kiltz, and J. Pan, (Hierarchical) Identity-Based Encryption from Affine Message Authentication, 2002.
DOI : 10.1007/978-3-662-44371-2_23

URL : https://hal.archives-ouvertes.fr/hal-01239920

X. Boyen and Q. Li, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, 0793.
DOI : 10.1007/978-3-642-03356-8_36

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993.
DOI : 10.1145/168588.168596

M. Bellare, B. Waters, and S. Yilek, Identity-Based Encryption Secure against Selective Opening Attack, 2008.
DOI : 10.1007/978-3-642-19571-6_15

URL : http://eprint.iacr.org/2010/159.pdf

J. Chen, R. Gay, and H. Wee, Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, EUROCRYPT 2015, 2015.
DOI : 10.1007/978-3-662-46803-6_20

URL : https://hal.archives-ouvertes.fr/hal-01220358

J. Chen, B. Libert, and S. C. Ramanna, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, SCN 2016, 2016.
DOI : 10.1007/978-3-642-54631-0_16

URL : https://hal.archives-ouvertes.fr/hal-01309562

M. Chase and S. Meiklejohn, D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, EUROCRYPT 2014, p.7, 2014.
DOI : 10.1007/978-3-642-55220-5_34

URL : http://cseweb.ucsd.edu/~smeiklejohn/files/eurocrypt14a.pdf

M. Chase, M. Maller, and S. Meiklejohn, D??j?? Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, 0713.
DOI : 10.1007/978-3-662-49099-0_9

J. Chen and H. Wee, Fully, (Almost) Tightly Secure IBE and Dual System Groups, 2007.
DOI : 10.1007/978-3-642-40084-1_25

G. Gong, J. Chen, X. Dong, Z. Cao, and S. Tang, Extended Nested Dual System Groups, Revisited, PKC 2016, 2016.
DOI : 10.1007/978-3-662-49384-7_6

J. Gong, X. Dong, J. Chen, and Z. Cao, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, ASIACRYPT 2016, 2016.
DOI : 10.1007/978-3-642-54242-8_26

G. and C. Gentry, Practical Identity-Based Encryption Without Random Oracles, EUROCRYPT 2006, 2006.
DOI : 10.1007/11426639_7

URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2330/2330.pdf

D. Hofheinz, J. Koch, and C. Striecks, Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting, PKC 2015, p.17, 2015.
DOI : 10.1007/978-3-662-46447-2_36

H. and D. Hofheinz, Adaptive partitioning. IACR Cryptology ePrint Archive, 2016.

H. and D. Hofheinz, Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography, TCC 2016, 2016.
DOI : 10.1007/11426639_7

L. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, 0716.
DOI : 10.1007/978-3-642-13190-5_4

URL : http://eprint.iacr.org/2010/110.pdf

B. Libert, C. Somindu, M. Ramanna, and . Yung, Functional commitment schemes: From polynomial commitments to pairing-based accumulators from simple assumptions, ICALP 2016, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01306152

M. Naor and O. Reingold, Number-theoretic constructions of efficient pseudo-random functions, Journal of the ACM, vol.51, issue.2, pp.231-262, 2004.
DOI : 10.1145/972639.972643

T. Okamoto and K. Takashima, Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, 2010.
DOI : 10.1007/978-3-642-14623-7_11

URL : https://eprint.iacr.org/2010/563.pdf

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO 84, 1984.
DOI : 10.1007/3-540-39568-7_5

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf

W. and B. Waters, Efficient Identity-Based Encryption Without Random Oracles, EUROCRYPT 2005, 2005.
DOI : 10.1007/11426639_7

B. Waters, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, 2004.
DOI : 10.1007/978-3-642-03356-8_36

URL : http://eprint.iacr.org/2009/385.pdf

W. and H. Wee, D??j?? Q: Encore! Un Petit IBE, 2009.
DOI : 10.1007/978-3-642-54242-8_26