1. Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extentions. In: CRYPTO‘05, vol. 3621, pp. 205–222. (2005).
2. Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. (2007).
3. Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT‘04, vol. 3027, pp. 223–238. (2004).
4. Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO‘04, vol. 3152, pp. 41–55 (2004).
5. Boneh D., Crescenzo G.D., Octrovsky R., Persiano G., Public key encryption with keyword search. In: EUROCRYPT‘04. vol. 3027, pp. 506–522. (2004).