1. Achieving efficient conjunctive keyword searches over encrypted data;Ballard,2005
2. Variations of Diffie-Hellman problem;Bao,2003
3. Space/time trade-offs in hash coding with allowable errors;Bloom;Commun. ACM,1970
4. Aggregate and verifiably encrypted signatures from bilinear maps;Boneh,2003
5. Collusion resistant broadcast encryption with short ciphertexts and private keys;Boneh,2005