1. Secure schemes for secret sharing and key distribution;A.,1996
2. Ciphertext-policy attribute-based encryption;Bethencourt,2007
3. Divertible protocols and atomic proxy cryptography;Blaze,1998
4. Efficient selective-id secure identity-based encryption without random oracles;Boneh,2004
5. Relaxing chosen-ciphertext security;Canetti,2003