[. Applebaum and Z. Brakerski, Obfuscating Circuits via Composite-Order Graded Encoding, Dodis and Nielsen [DN15], pp.528-556
DOI : 10.1007/978-3-662-46497-7_21

[. Boneh, X. Boyen, and H. Shacham, Short Group Signatures, LNCS, vol.3152, pp.41-55, 2004.
DOI : 10.1007/978-3-540-28628-8_3

D. Boneh, S. Halevi, M. Hamburg, and R. Ostrovsky, Circular-Secure Encryption from Decision Diffie-Hellman, LNCS, vol.5157, pp.108-125, 2008.
DOI : 10.1007/978-3-540-85174-5_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.4099

D. Boneh, K. Lewi, H. W. Montgomery, and A. Raghunathan, Key Homomorphic PRFs and Their Applications, Canetti and Garay [CG13a], pp.410-428
DOI : 10.1007/978-3-642-40041-4_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.477.2961

D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry et al., Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation, Oswald and Fischlin [OF15], pp.563-594
DOI : 10.1007/978-3-662-46803-6_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.690.2359

D. Boneh and A. Silverberg, Applications of multilinear forms to cryptography, Contemporary Mathematics, vol.324, pp.71-90, 2003.
DOI : 10.1090/conm/324/05731

[. Boneh, B. Waters, and M. Zhandry, Low Overhead Broadcast Encryption from Multilinear Maps, CRYPTO 2014, pp.206-223, 2014.
DOI : 10.1007/978-3-662-44371-2_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.6438

C. Jean-sébastien-coron, S. Gentry, T. Halevi, H. K. Lepoint, E. Maji et al., Zeroizing without low-level zeroes: New MMAP attacks and their limitations, Cryptology ePrint Archive, vol.15596596, 2015.

K. Jung-hee-cheon, C. Han, H. Lee, D. Ryu, and . Stehlé, Cryptanalysis of the multilinear map over the integers, EUROCRYPT 2015, pp.3-12, 2015.

J. Hee-cheon, C. Lee, and H. Ryu, Cryptanalysis of the new CLT multilinear maps. Cryptology ePrint Archive, 2015.

T. Jean-sébastien-coron, M. Lepoint, and . Tibouchi, Practical multilinear maps over the integers, Canetti and Garay [CG13a], pp.476-493

T. Jean-sébastien-coron, M. Lepoint, and . Tibouchi, New multilinear maps over the integers, Gennaro and Robshaw [GR15], pp.267-286

[. Canetti, H. Lin, S. Tessaro, and V. Vaikuntanathan, Obfuscation of Probabilistic Circuits and Applications, Dodis and Nielsen [DN15], pp.468-497
DOI : 10.1007/978-3-662-46497-7_19

J. Coron, Cryptanalysis of GGH15 multilinear maps. Cryptology ePrint Archive, 2015.

A. Escala, G. Herold, E. Kiltz, C. Ràfols, and J. Villar, An algebraic framework for Diffie-Hellman assumptions, Canetti and Garay [CG13b], pp.129-147

S. V. Eduarda, D. Freire, K. G. Hofheinz, C. Paterson, and . Striecks, Programmable hash functions in the multilinear setting, Canetti and Garay [CG13a], pp.513-530

S. Garg, C. Gentry, and S. Halevi, Candidate Multilinear Maps from Ideal Lattices, EUROCRYPT 2013, pp.1-17, 2013.
DOI : 10.1007/978-3-642-38348-9_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6312

C. Garg, S. Gentry, M. Halevi, A. Raykova, B. Sahai et al., Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp.40-49, 2013.
DOI : 10.1109/FOCS.2013.13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6501

C. Garg, S. Gentry, A. Halevi, B. Sahai, and . Waters, Attributebased encryption for circuits from multilinear maps, Canetti and Garay [CG13b], pp.479-499

[. Gentry, S. Gorbunov, and S. Halevi, Graph-Induced Multilinear Maps from Lattices, Dodis and Nielsen [DN15], pp.498-527
DOI : 10.1007/978-3-662-46497-7_20

C. Gentry, J. Groth, Y. Ishai, C. Peikert, A. Sahai et al., Using fully homomorphic hybrid encryption to minimize non-interative zeroknowledge proofs, Journal of Cryptology, pp.1-24, 2014.
DOI : 10.1007/s00145-014-9184-y

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.468.9628

S. Garg, C. Gentry, A. Sahai, and B. Waters, Witness encryption and its applications, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.467-476, 2013.
DOI : 10.1145/2488608.2488667

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.860

D. Galindo, J. Herranz, and J. L. Villar, Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience, ESORICS 2012, pp.627-642, 2012.
DOI : 10.1007/978-3-642-33167-1_36

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, LNCS, vol.4965, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

Y. Hu and H. Jia, Cryptanalysis of GGH map Cryptology ePrint Archive, 2015.

[. Hohenberger, A. Sahai, and B. Waters, Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures, Canetti and Garay [CG13a], pp.494-512
DOI : 10.1007/978-3-642-40041-4_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6165

B. Minaud and P. Fouque, Cryptanalysis of the new multilinear map over the integers, Cryptology ePrint Archive, 2015.

M. Naor and G. Segev, Public-key cryptosystems resilient to key leakage, LNCS, vol.5677, pp.18-35, 2009.
DOI : 10.1007/978-3-642-03356-8_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.9956

M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, Proceedings of the twenty-second annual ACM symposium on Theory of computing , STOC '90, pp.427-437, 1990.
DOI : 10.1145/100216.100273

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5883

[. Papamanthou, R. Tamassia, and N. Triandopoulos, Optimal Authenticated Data Structures with Multilinear Forms, PAIRING 2010, pp.246-264
DOI : 10.1007/978-3-642-17455-1_16

[. Tang, H. Li, and B. Liang, Attribute-Based Signatures for Circuits from Multilinear Maps, ISC 2014, pp.54-71, 2014.
DOI : 10.1007/978-3-319-13257-0_4

T. Yamakawa, S. Yamada, G. Hanaoka, and N. Kunihiro, Selfbilinear map on unknown order groups from indistinguishability obfuscation and its applications, CRYPTO 2014, Part II, pp.90-107, 2014.
DOI : 10.1007/978-3-662-44381-1_6