1. Guo, F., Susilo, W., Mu, Y.: Distance based encryption: how to embed fuzziness in Biometric Based Encryption. IEEE Trans. Inf. Forensics Secur. 11(2), 247–257 (2016). https://doi.org/10.1109/TIFS.2015.2489179
2. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM CCS 2006, pp. 89–98. ACM Press, October/November 2006. Available as Cryptology ePrint Archive Report 2006/309
3. Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: Proceedings of the USENIX Security Symposium, San Francisco, CA, USA (2013)
4. Lai, J., Deng, R., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343–1354 (2013)
5. Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014, LNCS, vol. 8383, pp. 293–310. Springer, March 2014