J. Baek and Y. Zheng, Identity-Based Threshold Decryption, PKC 2004, pp.262-276, 2004.
DOI : 10.1007/978-3-540-24632-9_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.1878

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

D. Boneh and X. Boyen, Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, EUROCRYPT 2004, pp.223-238, 2004.
DOI : 10.1007/978-3-540-24676-3_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5446

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, EUROCRYPT 2005, pp.440-456, 2005.
DOI : 10.1007/11426639_26

URL : http://ai.stanford.edu/~xb/eurocrypt05a/eurocrypt05tinyhibe.ps

D. Boneh, X. Boyen, and S. Halevi, Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, CT-RSA 2006, pp.226-243, 2006.
DOI : 10.1007/11605805_15

URL : http://ai.stanford.edu/~xb/ctrsa06/threshold.ps

D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, CRYPTO 2001, pp.213-229, 2001.

D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, CRYPTO 2005, pp.258-275, 2005.
DOI : 10.1007/11535218_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.329.5787

R. Canetti and S. Goldwasser, An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract), EUROCRYPT '99, pp.90-106, 1999.
DOI : 10.1007/3-540-48910-X_7

Z. Chai, Z. Cao, and Y. Zhou, Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), pp.148-154, 2006.
DOI : 10.1109/IMSCCS.2006.217

V. Daza, J. Herranz, P. Morillo, and C. R. , CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts, ProvSec 2007, pp.35-50, 2007.
DOI : 10.1007/978-3-540-75670-5_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.3475

A. De-santis, Y. Desmedt, Y. Frankel, and M. Yung, How to share a function securely, Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.522-533, 1994.
DOI : 10.1145/195058.195405

C. Delerablée, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, ASIACRYPT 2007, pp.200-215, 2007.
DOI : 10.1007/978-3-540-76900-2_12

C. Delerablée, P. Paillier, and D. Pointcheval, Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys, Pairing 2007, pp.39-59, 2007.
DOI : 10.1007/978-3-540-73489-5_4

Y. Desmedt and Y. Frankel, Threshold cryptosystems, CRYPTO '89, pp.307-315, 1990.
DOI : 10.1007/3-540-57220-1_47

A. Fiat and M. Naor, Broadcast Encryption, CRYPTO '93, pp.480-491, 1994.
DOI : 10.1007/3-540-48329-2_40

A. Fiat and A. Shamir, How To Prove Yourself: Practical Solutions to Identification and Signature Problems, CRYPTO '86, pp.186-194, 1987.
DOI : 10.1007/3-540-47721-7_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.8796

Y. Frankel, A Practical Protocol for Large Group Oriented Networks, EUROCRYPT '89, pp.56-61, 1990.
DOI : 10.1007/3-540-46885-4_8

R. Gennaro, S. Halevi, H. Krawczyk, and T. Rabin, Threshold RSA for Dynamic and Ad-Hoc Groups, EUROCRYPT 2008, pp.88-107, 2008.
DOI : 10.1007/978-3-540-78967-3_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.8882

H. Ghodosi, J. Pieprzyk, and R. Safavi-naini, Dynamic threshold cryptosystems: A new scheme in group oriented cryptography, PRAGOCRYPT '96, pp.370-379, 1996.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

T. Michael, J. Z. Goodrich, R. Sun, and . Tamassia, Efficient tree-based revocation in groups of low-state devices, CRYPTO 2004, pp.511-527, 2004.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, CRYPTO 2002, pp.47-60, 2002.
DOI : 10.1007/3-540-45708-9_4

A. Joux, A one-round protocol for tripartite diffie-hellman, ANTS, pp.385-394, 2000.

B. Libert and J. Quisquater, Efficient revocation and threshold pairing based cryptosystems, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.163-171, 2003.
DOI : 10.1145/872035.872059

D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers, CRYPTO 2001, pp.41-62, 2001.
DOI : 10.1007/3-540-44647-8_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8970

M. Naor, On cryptographic assumptions and challenges (invited talk, CRYPTO 2003, pp.96-109, 2003.
DOI : 10.1007/978-3-540-45146-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9911

M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing , STOC '90, 1990.
DOI : 10.1145/100216.100273

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5883

D. Pointcheval and J. Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000.
DOI : 10.1007/s001450010003

C. Rackoff and D. R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, CRYPTO '91, pp.433-444, 1992.
DOI : 10.1007/3-540-46766-1_35

C. Schnorr, Efficient identification and signatures for smart cards, CRYPTO '89, pp.239-252, 1990.

V. Shoup, Lower Bounds for Discrete Logarithms and Related Problems, EUROCRYPT '97, pp.256-266, 1997.
DOI : 10.1007/3-540-69053-0_18

V. Shoup, ISO 18033-2: An emerging standard for public-key encryption, 2004.

V. Shoup and R. Gennaro, Securing threshold cryptosystems against chosen ciphertext attack, EUROCRYPT '98, pp.1-16, 1998.