1. Shamir, A. (1984). Identity-base cryptosystems and signatures schemes. In Proceedings of the Crypto’84, LNCS 196 (pp. 47–53). Springer.
2. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Advances in cryptology, Eurocrypt, LNCS 3494 (pp. 457–473). Springer.
3. Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. ACM CCS’06 (pp. 89–98). New York: ACM Press.
4. Khader, D. (2007). Attribute based group signatures. Cryptology ePrint archive, report 2007/159.
http://eprint.iacr.org/2007/159
.
5. Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint archive, report 2008/328.
http://eprint.iacr.org/2008/328
.