1. Fuzzy identity-based encryption;Sahai,2005
2. Attribute-based encryption for fine-grained access control of encrypted data;Goyal,2006
3. Ciphertext-policy attribute-based encryption;Bethencourt,2007
4. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption;Lewko,2010
5. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization;Waters,2011