J. Li, M. Krohn, D. Mazieres, and D. Sasha. Secure untrusted data repository: SUNDR. In Proc. of OSDI, 2004. S. Narayan, M. Gagne, and R. Safavi-Naini. Privacy preserving EHR system using attribute-based infrastructure. In Proc. of CCSW, 2010. D. Nali, C. Adams, and A. Miri. Using threshold attribute-based encryption for practical biometric-based access control. Journal of network security, 2005.