1. J. Baek, W. Susilo, J. Zhou, New Constructions of fuzzy identity-based encryption, ASIACCS’07, ACM, 2007, pp. 368–370.
2. M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, EUROCRYPT’03, LNCS, vol. 2656, Springer, 2003, pp. 614–629.
3. J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: IEEE Symposium on Security and Privacy’07, IEEE, 2007, pp. 321–334.
4. D. Boneh, X. Boyen. Efficient selective-ID secure identity based encryption without random oracles, EUROCRYPT’04, Springer, LNCS, vol. 3027, 2004, pp. 223–238.
5. E. Bresson, J. Stern, M. Szydlo, Threshold ring signatures and applications to ad-hoc groups, CRYPTO’02, LNCS, vol. 2442, Springer, 2002, pp. 465–480.