1. Efficient broadcast encryption with user profiles;Ak;Information Sciences,2010
2. Identity-based threshold decryption;Baek,2004
3. Ciphertext-policy attribute-based encryption;Bethencourt,2007
4. Security of ramp schemes;Blakley,1985
5. Hierarchical identity based encryption with constant size ciphertext;Boneh,2005