1. Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation;Attrapadung,2010
2. Key-privacy in public-key encryption;Bellare,2001
3. Hierarchical identity based encryption with constant size ciphertext;Boneh,2005
4. Evaluating 2-DNF formulas on ciphertexts;Boneh,2005
5. Generalized identity based and boradcast encryption schemes;Boneh,2008