1. Identity-based cryptosystems and signature schemes;Shamir,1984
2. Certificateless public key cryptography;Al-Riyami,2003
3. Registration-based encryption: removing private-key generator from IBE;Garg,2018
4. Registration-based encryption from standard assumptions;Garg,2019
5. Verifiable registration-based encryption;Goyal,2020