1. Functional encryption: deterministic to randomized functions from simple assumptions;Agrawal,2017
2. On the (im)possibility of obfuscating programs;Barak,2001
3. Functional encryption: definitions and challenges;Boneh,2011
4. Anonymous hierarchical identity-based encryption (without random oracles);Boyen,2006
5. Identity-based encryption secure against selective opening attack;Bellare,2011