1. Beimel, A. (1996). Secure schemes for secret sharing and key distribution. Ph.D. dissertation, Israel Inst. Technol. Technion, Haifa, Israel.
2. Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Theory of Cryptography. Heidelberg, Germany: Springer, pp. 535–554.
3. Frikken, K., Atallah, M., & Li, J. (2006). Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers, 55(10), 1259–1270.
4. Helmer, A., Lipprandt, M., Frenken, T., et al. (2011). Empowering patients through personal health records: a survey of existing third-party webbased PHR products. Electronic Journal of Health Informatics, 6(3), e26.
5. Hur, J. (2013). Attribute-based secure data sharing with hidden policies in smart grid. IEEE Transactions on Parallel and Distributed Systems, 24(11), 2171–2180.