1. Attrapadung N., Herranz J., Laguillaumie F., Libert B., De Panafieu E., Ràfols C.: Attribute-based encryption schemes with constant-size ciphertexts. Theor. Comput. Sci. 422, 15–38 (2012).
2. Bellare M., Rogaway P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proceedings of CCS’93, pp. 62–73. ACM Press, New York (1993).
3. Blakley G.R.: Safeguarding cryptographic keys. In: Proc Natl Comput Conf Am Fed Inf Process Soc Proc 48, 313–317 (1979).
4. Blundo C., De Santis A., Di Crescenzo G., Gaggia A.G., Vaccaro U.: Multi-secret Sharing Schemes. In: CRYPTO ’94, LNCS 839, pp. 150–163. Springer, Heidelberg (1994).
5. Boldyreva A.: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie–Hellman-Group Signature Scheme. In: Proceedings of PKC’03, LNCS 2567, pp. 31–46. Springer, Berlin (2003).