R. C. Merkle, Method of providing digital signatures. https://www.google.com, p.4309569, 1979.

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

M. Swan, Blockchain: Blueprint for a new economy, 2015.

G. Zyskind and O. Nathan, Decentralizing Privacy: Using Blockchain to Protect Personal Data, 2015 IEEE Security and Privacy Workshops, pp.180-184, 2015.
DOI : 10.1109/SPW.2015.27

S. Kiyomoto, T. Nakamura, H. Takasaki, R. Watanabe, and Y. Miyake, PPM: Privacy Policy Manager for Personalized Services, Security Engineering and Intelligence Informatics, pp.377-392, 2013.
DOI : 10.1007/978-3-642-40588-4_26

URL : https://hal.archives-ouvertes.fr/hal-01506558

S. K. Datta, A. Gyrard, C. Bonnet, and K. Boudaoud, oneM2M Architecture Based User Centric IoT Application Development, 2015 3rd International Conference on Future Internet of Things and Cloud, pp.100-107, 2015.
DOI : 10.1109/FiCloud.2015.7

URL : https://hal.archives-ouvertes.fr/hal-01206791

G. Ateniese, D. H. Chou, B. De-medeiros, and G. Tsudik, Sanitizable Signatures, European Symposium on Research in Computer Security, pp.159-177, 2005.
DOI : 10.1007/11555827_10

K. Miyazaki, G. Hanaoka, and I. Hideki, Invisibly Sanitizable Digital Signature Scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.91, issue.1, pp.392-402, 2008.
DOI : 10.1093/ietfec/e91-a.1.392

C. Brzuska, M. Fischlin, T. Freudenreich, A. Lehmann, M. Page et al., Security of Sanitizable Signatures Revisited, pp.317-336, 2009.
DOI : 10.1007/978-3-540-30598-9_12

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, International Conference on the Theory and Applications of Cryptographic Techniques, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://eprint.iacr.org/2002/175.ps.gz

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security, pp.89-98, 2006.

A. Leung and C. J. Mitchell, Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments, International Conference on Ubiquitous Computing, pp.73-90, 2007.
DOI : 10.1007/978-3-540-74853-3_5

URL : http://www.isg.rhul.ac.uk/~cjm/nnibpp.pdf