1. Baek, J., Safavi-Naini, R., and Susilo, W.: Public key encryption with keyword search revisited. In: Proc. International Conference on Computational Science and Its Applications (ICCSA), Vol. 5072, p. 12491259, Springer, 2008.
2. Bethencourt, J., Sahai, A., and Waters, B.: Ciphertext-Policy Attribute-Based Encryption. Security and Privacy IEEE Symposium on, IEEE pp. 321–334, 2007
3. Chase, M.: Multi-authority attribute based encryption. In: Proceedings of the 4th conference on Theory of cryptography, Berlin, pp. 515–534, 2007
4. Chase, M., and Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, ACM, pp. 121–130, 2009
5. Fukunaga, K., Introduction to Statistical Pattern Recognition. London: Academic Press, 1991.