M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno et al., Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. In Crypto'05, 2005.

M. Abdalla, E. Kiltz, and G. Neven, Generalized Key Delegation for Hierarchical Identity-Based Encryption, ESORICS'07, 2007.
DOI : 10.1007/978-3-540-74835-9_10

URL : https://hal.archives-ouvertes.fr/hal-00918551

M. Abe, J. Groth, M. Ohkubo, and T. Tango, Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups, Crypto 2014, 2014.
DOI : 10.1007/978-3-662-44371-2_14

N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. De-panafieu et al., Attribute-based encryption schemes with constant-size ciphertexts, Theoretical Computer Science, vol.422, 2012.
DOI : 10.1016/j.tcs.2011.12.004

URL : https://hal.archives-ouvertes.fr/hal-00763158

N. Attrapadung and B. Libert, Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, 2010.

N. Attrapadung, B. Libert, and E. Panafieu, Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC 2011, 2011.
DOI : 10.1007/978-3-642-19379-8_6

N. Attrapadung, Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More, Eurocrypt'14, 2014.
DOI : 10.1007/978-3-642-55220-5_31

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993.
DOI : 10.1145/168588.168596

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, 2005.
DOI : 10.1007/11426639_26

D. Boneh, G. Di-crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, Eurocrypt'04, 2004.
DOI : 10.1007/978-3-540-24676-3_30

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Crypto'01, pp.586-615, 2001.
DOI : 10.1137/S0097539701398521

D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko et al., Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits, Eurocrypt 2014, 2014.
DOI : 10.1007/978-3-642-55220-5_30

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, 2005.
DOI : 10.1007/11535218_16

D. Boneh and M. Hamburg, Generalized Identity Based and Broadcast Encryption Schemes, Asiacrypt'08, 2008.
DOI : 10.1007/3-540-36178-2_33

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, TCC'11, 2011.
DOI : 10.1007/978-3-642-19571-6_16

D. Boneh, B. Waters, and M. Zhandry, Low-overhead Broadcast Encryption from Multi-Linear Maps, Crypto'14, 2014.

X. Boyen and B. Waters, Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), Crypto'06, 2006.
DOI : 10.1007/11818175_17

R. Canetti, S. Halevi, and J. Katz, A Forward-Secure Public-Key Encryption Scheme, Eurocrypt'03, 2003.

J. Chen, J. Gong, and J. Weng, Tightly Secure IBE Under Constant-Size Master Public Key, PKC (1) 2017, 2017.
DOI : 10.1007/978-3-662-49099-0_9

URL : https://hal.archives-ouvertes.fr/hal-01643457

J. Chen, B. Libert, and S. Ramanna, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, SCN 2016, pp.23-41, 2016.
DOI : 10.1007/978-3-642-54631-0_16

URL : https://hal.archives-ouvertes.fr/hal-01309562

J. Chen and H. Wee, Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula, SCN 2014, 2014.
DOI : 10.1007/978-3-319-10879-7_16

URL : https://eprint.iacr.org/2014/465.pdf

M. Chase and S. Meiklejohn, D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, Eurocrypt 2014, 2014.
DOI : 10.1007/978-3-642-55220-5_34

URL : http://cseweb.ucsd.edu/~smeiklejohn/files/eurocrypt14a.pdf

M. Chase, M. Maller, and S. Meiklejohn, D??j?? Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Asiacrypt (2) 2016, 2016.
DOI : 10.1007/978-3-662-49099-0_9

URL : http://discovery.ucl.ac.uk/1536451/1/Meiklejohn_further-q.pdf

J. Cheon, Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, 2006.
DOI : 10.1007/BFb0054891

URL : http://www.iacr.org/cryptodb/archive/2006/EUROCRYPT/2143/2143.pdf

J. Cheon, K. Han, C. Lee, H. D. Ryu, and . Stehlé, Cryptanalysis of the Multilinear Map over the Integers, Eurocrypt'15, 2015.
DOI : 10.1007/978-3-662-46800-5_1

URL : https://hal.archives-ouvertes.fr/hal-01240445

C. Delerablée, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt 2007, 2007.
DOI : 10.1007/978-3-540-76900-2_12

C. Delerablée and D. , Dynamic Threshold Public-Key Encryption, Crypto 2008, 2007.
DOI : 10.1007/978-3-540-85174-5_18

D. Derler, T. Jager, D. Slamanig, and C. Striecks, Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange, Eurocrypt 2018, 2018.
DOI : 10.1007/978-3-319-45741-3_16

A. Fiat and M. Naor, Broadcast Encryption, Crypto'93, 1993.
DOI : 10.1007/3-540-48329-2_40

D. Freeman, Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups, Eurocrypt'10, 2010.
DOI : 10.1007/978-3-642-13190-5_3

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-13190-5_3.pdf

R. Gay, I. Kerenidis, and H. Wee, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Crypto'15, 2015.
DOI : 10.1007/978-3-662-48000-7_24

URL : https://hal.archives-ouvertes.fr/hal-01220355

S. Garg, C. Gentry, S. Halevi, M. Raykova, A. Sahai et al., Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, FOCS, vol.2013, 2013.
DOI : 10.1137/14095772x

URL : https://eprint.iacr.org/2013/451.pdf

C. Gentry and B. Waters, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts), Euro- crypt'09, 2009.
DOI : 10.1007/978-3-540-30598-9_15

S. Gorbunov, V. Vaikuntanathan, and H. Wee, Attribute-Based Encryption for Circuits from LWE, 2013.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180418

URL : http://www.cs.ucla.edu/~sahai/work/web/2006 Publications/ACM_CCS2006.pdf

J. Herranz, F. Laguillaumie, and C. , Constant Size Ciphertexts in Threshold Attribute-Based Encryption, PKC'10, 2010.
DOI : 10.1007/978-3-642-13013-7_2

URL : https://hal.archives-ouvertes.fr/hal-01083535

S. Hohenberger and B. Waters, Attribute-Based Encryption with Fast Decryption, PKC 2013, 2013.
DOI : 10.1007/978-3-642-36362-7_11

URL : http://eprint.iacr.org/2013/265.pdf

J. Katz and Y. Lindell, Introduction to Modern Cryptography, Second Edition, 2008.

J. Katz, A. Sahai, and B. Waters, Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, 2008.
DOI : 10.1007/s00145-012-9119-4

URL : http://www.cs.umd.edu/~jkatz/papers/ec08.pdf

A. Lewko, A. Sahai, and B. Waters, Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.23

URL : http://eprint.iacr.org/2008/309.pdf

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt 2010, 2010.
DOI : 10.1007/978-3-642-13190-5_4

URL : http://eprint.iacr.org/2010/110.pdf

A. Lewko and B. Waters, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, 2010.
DOI : 10.1007/978-3-540-78967-3_9

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-11799-2_27.pdf

M. Naor, D. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, Crypto 2001, 2001.
DOI : 10.1007/3-540-44647-8_3

URL : http://www.iacr.org/archive/crypto2001/21390040.pdf

M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, 1962.
DOI : 10.1007/3-540-45472-1_1

L. Nguyen, Accumulators from Bilinear Pairings and Applications, CT-RSA'05, 2005.
DOI : 10.1007/978-3-540-30574-3_19

T. Okamoto and K. Takashima, Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, 2010.
DOI : 10.1007/978-3-642-14623-7_11

URL : https://eprint.iacr.org/2010/563.pdf

T. Okamoto and K. Takashima, Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption, CANS 2011, 2011.
DOI : 10.1007/s10623-015-0131-1

URL : https://link.springer.com/content/pdf/10.1007%2Fs10623-015-0131-1.pdf

T. Okamoto and K. Takashima, Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, Asi- acrypt'12, 2012.
DOI : 10.1007/978-3-642-34961-4_22

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-34961-4_22.pdf

T. Okamoto and K. Takashima, Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption. Designs, Codes and Cryptography 77, pp.2-3, 2015.
DOI : 10.1007/s10623-015-0131-1

URL : https://link.springer.com/content/pdf/10.1007%2Fs10623-015-0131-1.pdf

R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315270

URL : http://www.cs.ucla.edu/~rafail/PUBLIC/88.pdf

Y. Rouselakis and B. Waters, Practical constructions and new proof methods for large universe attribute-based encryption, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516672

R. Sakai and J. Furukawa, Identity-Based Broadcast Encryption, Cryptology ePrint Archive, 2007.

R. Sakai and M. Kasahara, ID-based Cryptosystems with Pairing on Elliptic Curve, Cryptology ePrint Archive, p.54, 2003.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Eurocrypt'05, 2005.
DOI : 10.1007/11426639_27

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Crypto'84, 1984.
DOI : 10.1007/3-540-39568-7_5

URL : https://link.springer.com/content/pdf/10.1007%2F3-540-39568-7_5.pdf

K. Takashima, Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption, SCN 2014, 2014.
DOI : 10.1007/978-3-319-10879-7_17

URL : http://eprint.iacr.org/2014/207.pdf

K. Takashima, New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption, ACISP 2017, 2017.
DOI : 10.1007/978-3-642-19379-8_4

B. Waters, Efficient Identity-Based Encryption Without Random Oracles, Eurocrypt 2005, 2005.
DOI : 10.1007/11426639_7

URL : http://libeccio.dia.unisa.it/CRYPTO07/Papers/Waters.pdf

B. Waters, Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, Crypto 2009, 2009.
DOI : 10.1007/978-3-642-03356-8_36

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-642-03356-8_36.pdf