1. Simultaneous hardcore bits and cryptography against memory attacks;Akavia,2009
2. Public-key encryption in the bounded-retrieval model;Alwen,2010
3. Efficient multi-receiver identity-based encryption and its application to broadcast encryption;Baek,2005
4. Identity-based encryption secure against selective opening attack;Bellare,2011
5. Collusion resistant broadcast encryption with short ciphertexts and private keys;Boneh,2005