1. Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant ciphertext. In: EUROCRYPT’05. LNCS 3494. Springer, New York, pp 440–456
2. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy’07. IEEE, Washington, DC, pp 321–334
3. Boneh D, Boyen, X (2004) Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT’04. LNCS 3027. Springer, New York, pp 223–2382004
4. Boneh D, Canetti R, Halevi S, Katz J (2007) Chosen-ciphertext security from identity-based encryption. SIAM J Comput 36(5):1301–1328
5. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: TCC’07. LNCS 4392. Springer, pp 535–554