N. Asokan, V. Shoup, and M. Waidner, Optimistic fair exchange of digital signatures, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.593-610, 2000.
DOI : 10.1109/49.839935

M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, Non-interactive anonymous credentials, pp.356-374, 2008.

M. Bellare, D. Micciancio, and B. Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, EUROCRYPT '03, pp.614-629, 2003.
DOI : 10.1007/3-540-39200-9_38

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

M. Bellare, H. Shi, and C. Zhang, Foundations of Group Signatures: The Case of Dynamic Groups, CT-RSA 2005, pp.136-153, 2005.
DOI : 10.1007/978-3-540-30574-3_11

M. Blum, P. Feldman, and S. Micali, Non-interactive zero-knowledge and its applications, Proceedings of the twentieth annual ACM symposium on Theory of computing , STOC '88, pp.103-112, 1988.
DOI : 10.1145/62212.62222

A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights. IACR ePrint Archive, Boneh, X. Boyen. Short signatures without random oracles. EUROCRYPT '04, LCNS 3027, pp.56-73, 2003.

D. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, CRYPTO '04, pp.43-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT '03, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, TCC '05, LCNS 3378, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

X. Boyen and B. Waters, Compact Group Signatures Without Random Oracles, EUROCRYPT '06, pp.427-444, 2006.
DOI : 10.1007/11761679_26

X. Boyen and B. Waters, Full-Domain Subgroup Hiding and Constant-Size Group Signatures, PKC '07, pp.1-15, 2007.
DOI : 10.1007/978-3-540-71677-8_1

URL : http://ai.stanford.edu/~xb/pkc07/fullgrpsigs.pdf

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

D. Chaum and E. Van-heyst, Group signatures Persiano. Zero-knowledge proofs of knowledge without interaction, EUROCRYPT '91 FOCS '92, pp.257-265, 1991.

G. Fuchsbauer and D. , Anonymous proxy signatures. SCN '08, LNCS, vol.5229, pp.201-217, 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

S. Goldwasser, S. Micali, and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

J. Groth, R. Ostrovsky, and A. Sahai, Non-interactive Zaps and New Techniques for NIZK, CRYPTO '06, pp.97-111, 2006.
DOI : 10.1007/11818175_6

J. Groth, R. Ostrovsky, and A. Sahai, Perfect Non-interactive Zero Knowledge for NP, EUROCRYPT '06, pp.339-358, 2006.
DOI : 10.1007/11761679_21

J. Groth, Fully Anonymous Group Signatures Without Random Oracles, ASIACRYPT '07, pp.164-180, 2007.
DOI : 10.1007/978-3-540-76900-2_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.6315

J. Groth, Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures, pp.444-459, 2006.
DOI : 10.1007/11935230_29

J. Groth and A. Sahai, Efficient non-interactive proof systems for bilinear groups. EUROCRYPT '08, LCNS 4965, KP98] J. Kilian, E. Petrank. Identity escrow. CRYPTO '98 : LCNS 1462, pp.415-432, 1998.

M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996.
DOI : 10.1145/238168.238185

M. Naor, On cryptographic assumptions and challenges. CRYPTO '03, LCNS 2729, pp.96-109, 2003.
DOI : 10.1007/978-3-540-45146-4_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9911

A. Sahai, Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), pp.543-553, 1999.
DOI : 10.1109/SFFCS.1999.814628

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.4689

M. Trolin and D. Wikström, Hierarchical Group Signatures, Automata, Languages and Programming
DOI : 10.1007/11523468_37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.8038