1. Fuzzy identity-based encryption;Sahai,2005
2. Identity-based cryptosystems and signature schemes;Shamir,1985
3. Attribute-based encryption for fine-grained access control of encrypted data;Goyal,2006
4. Predicate encryption supporting disjunctions, polynomial equations, and inner products;Katz,2008
5. Worst-case to average-case reductions based on Gaussian measures;Micciancio,2004