1. Improved proxy re-encryption schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006
2. Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles;Bellare,2007
3. Divertible protocols and atomic proxy cryptography;Blaze,1998
4. Hierarchical identity based encryption with constant size ciphertext;Boneh,2005
5. Chosen-ciphertext security from identity-based encryption;Boneh;SIAM J. Comput.,2007