1. M. Abdalla, D. Catalano, D. Fiore, Verifiable random functions: relations to identity-based key encapsulation and new constructions. J. Cryptol.27(3), 544–593 (2014)
2. D. Boneh, X. Boyen, Secure identity based encryption without random oracles, in Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15–19, 2004, Proceedings (2004), pp. 443–459
3. E. Biham, D. Boneh, O. Reingold, Breaking generalized Diffie–Hellmann modulo a composite is no easier than factoring. Inf. Process. Lett.70(2), 83–87 (1999)
4. E. Boyle, S. Goldwasser, I. Ivan, Functional signatures and pseudorandom functions, in H. Krawczyk, editor, PKC 2014: 17th International Conference on Theory and Practice of Public Key Cryptography, Volume 8383 of Lecture Notes in Computer Science, Buenos Aires, Argentina, March 26–28 (Springer, Heidelberg, 2014), pp. 501–519
5. S. Badrinarayanan, V. Goyal, A. Jain, A. Sahai, Verifiable functional encryption, in Advances in Cryptology—ASIACRYPT 2016—22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4–8, 2016, Proceedings, Part II (2016), pp. 557–587