M. Abdalla, F. Bourse, A. De-caro, and D. Pointcheval, Simple Functional Encryption Schemes for Inner Products, Lecture Notes in Computer Science, vol.9020, pp.733-751, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01108287

M. Abdalla, F. Benhamouda, and R. Gay, From Single-Input to Multi-client Inner-Product Functional Encryption, Lecture Notes in Computer Science, vol.11923, pp.552-582, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02135963

M. Abdalla, F. Benhamouda, M. Kohlweiss, and H. Waldner, Decentralizing Inner-Product Functional Encryption, Public-Key Cryptography ? PKC 2019, vol.11443, pp.128-157, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02317011

. M. Acf-+-18, D. Abdalla, D. Catalano, R. Fiore, B. Gay et al., Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings, CRYPTO 2018, Part I, volume 10991 of LNCS, pp.597-627, 2018.

M. Abdalla, R. Gay, M. Raykova, and H. Wee, Multi-input Inner-Product Functional Encryption from Pairings, Lecture Notes in Computer Science, pp.601-626, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01380735

S. Agrawal, B. Libert, and D. Stehlé, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Advances in Cryptology ? CRYPTO 2016, vol.9816, pp.333-362, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01228559

S. Agrawal and A. Rosen, Functional Encryption for Bounded Collusions, Revisited, Theory of Cryptography, vol.10677, pp.173-205, 2017.

E. Bresson, D. Catalano, and D. Pointcheval, A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications, Advances in Cryptology - ASIACRYPT 2003, vol.2894, pp.37-54, 2003.

E. Boyle, K. Chung, and R. Pass, On Extractability Obfuscation, Theory of Cryptography, vol.8349, pp.52-73, 2014.

D. Boneh and M. K. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology ? CRYPTO 2001, vol.2139, pp.213-229, 2001.

D. Boneh, A. Sahai, and B. Waters, Functional Encryption: Definitions and Challenges, Theory of Cryptography, vol.6597, pp.253-273, 2011.

. Cdg-+-18a.-jérémy, E. D. Chotard, R. Sans, . Gay, D. Duong-hieu-phan et al., Decentralized multi-client functional encryption for inner product, ASIACRYPT 2018, Part II, vol.11273, pp.703-732, 2018.

. Cdg-+-18b.-jérémy, E. D. Chotard, R. Sans, . Gay, D. Duong-hieu-phan et al., Clifford Cocks. An identity based encryption scheme based on quadratic residues, 8th IMA International Conference on Cryptography and Coding, vol.2260, pp.360-363, 1021.

. Ehk-+-13.-alex, G. Escala, E. Herold, C. Kiltz, J. Ràfols et al., An algebraic framework for Diffie-Hellman assumptions, CRYPTO 2013, Part II, vol.8043, pp.129-147, 2013.

. Ggg-+-14.-shafi, S. D. Goldwasser, V. Gordon, A. Goyal, J. Jain et al., Multi-input functional encryption, LNCS, vol.8441, pp.578-602, 2014.

. Ggh-+-13.-sanjam, C. Garg, S. Gentry, M. Halevi, A. Raykova et al., Candidate indistinguishability obfuscation and functional encryption for all circuits, 54th FOCS, pp.40-49, 2013.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, pp.89-98, 2006.