1. Biometric identification over encrypted data made feasible;Adjedj,2009
2. Dual-policy attribute based encryption;Attrapadung,2009
3. Secure schemes for secret sharing and key distribution;Beimel,1996
4. Public key encryption with keyword search;Boneh,2004
5. Identity-based encryption from the weil pairing;Boneh,2001