M. Abdalla, F. Bourse, A. De-caro, and D. Pointcheval, Simple Functional Encryption Schemes for Inner Products, Lecture Notes in Computer Science, vol.9020, pp.733-751, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01108287

. Springer, March 1798?April 1798, Adams Family Correspondence, Volume 12, pp.421-542, 2015.

. Abp-+-17, Antimikrobielle Biomaterialien/Biofilmbildung auf Oberflächen. (ABP 01?ABP 12), Biomaterialien, vol.12, issue.1-4, 2011.

S. Agrawal, S. Bhattacherjee, D. H. Phan, D. Stehlé, and S. Yamada, Efficient Public Trace and Revoke from Standard Assumptions, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.2277-2293, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01643498

. M. Adml-+-07, A. W. Abdalla, J. Dent, G. Malone-lee, . Neven et al., Identity-based traitor tracing, LNCS, vol.4450, issue.2, pp.361-376, 2007.

. Ahl-+-08,

M. Ho-au, Q. Huang, J. K. Liu, W. Susilo, D. S. Wong et al., Traceable and retrievable identity-based encryption, ACNS 08, vol.5037, pp.94-110, 2008.

S. Agrawal, B. Libert, and D. Stehlé, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Advances in Cryptology ? CRYPTO 2016, vol.9816, pp.333-362, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01228559

C. E. , Z. Baltico, D. Catalano, D. Fiore, and R. Gay, Practical functional encryption for quadratic functions with applications to predicate encryption, CRYPTO 2017, Part I, vol.10401, pp.67-98, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01599768

D. Boneh and M. K. Franklin, An Efficient Public Key Traitor Tracing Scheme, Advances in Cryptology ? CRYPTO? 99, vol.1666, pp.338-353, 1999.

D. Boneh, A. Sahai, and B. Waters, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, Advances in Cryptology - EUROCRYPT 2006, vol.4004, pp.573-592, 2006.

. Springer, Erratum, Vorticity and Vortex Dynamics, pp.777-780, 2006.
URL : https://hal.archives-ouvertes.fr/hal-02484741

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, Theory of Cryptography, vol.6597, pp.253-273, 2011.

D. Boneh and M. Zhandry, Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation, Advances in Cryptology ? CRYPTO 2014, vol.8616, pp.480-499, 2014.

B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Advances in Cryptology ? CRYPTO ?94, vol.839, pp.257-270, 1994.

H. Chabanne, D. H. Phan, and D. Pointcheval, Public Traceability in Traitor Tracing Schemes, Lecture Notes in Computer Science, vol.3494, pp.542-558, 2005.

V. Cvw-+-18.-yilei-chen, B. Vaikuntanathan, H. Waters, D. Wee, and . Wichs, Traitor-tracing from LWE made simple and attribute-based, TCC 2018, Part II, vol.11240, p.7, 2018.

N. Fazio, A. Nicolosi, and D. H. Phan, Traitor Tracing with Optimal Transmission Rate, Lecture Notes in Computer Science, vol.4779, pp.71-88

R. Goyal, V. Koppula, and B. Waters, Collusion resistant traitor tracing from learning with errors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing - STOC 2018, p.7, 2018.

V. Goyal, Reducing Trust in the PKG in Identity Based Cryptosystems, Advances in Cryptology - CRYPTO 2007, vol.4622, pp.430-447

A. Kiayias and M. Yung, Traitor Tracing with Constant Transmission Rate, Advances in Cryptology ? EUROCRYPT 2002, vol.2332, pp.450-465, 2002.

Z. Liu, Z. Cao, and D. S. Wong, Blackbox traceable CP-ABE, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13, p.14, 2013.

S. Ling, D. H. Phan, D. Stehlé, and R. Steinfeld, Hardness of k-LWE and Applications in Traitor Tracing, Advances in Cryptology ? CRYPTO 2014, vol.8616, pp.315-334, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01643505

Z. Liu and D. S. Wong, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Applied Cryptography and Network Security, vol.15, pp.127-146, 2015.

. Lw15b,

Z. Liu and D. S. Wong, Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable, Information and Communications Security, vol.15, pp.109-124, 2016.

. Ncd-+-14.-jianting, Z. Ning, X. Cao, L. Dong, X. Wei et al., Large universe ciphertext-policy attribute-based encryption with white-box traceability, ESORICS 2014, Part II, vol.8713, pp.55-72, 2014.

R. Nishimaki, D. Wichs, and M. Zhandry, Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key, Advances in Cryptology ? EUROCRYPT 2016, vol.9666, pp.388-419, 2016.

V. Duong-hieu-phan and . Trinh, Identity-based trace and revoke schemes, LNCS, vol.6980, issue.2, p.5, 2011.

A. Sahai and B. R. Waters, Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005.