1. Identity-Based Cryptosystems and Signature Schemes;Shamir,1985
2. Identity-Based Encryption from the Weil Pairing;Boneh,2001
3. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products;Katz,2008
4. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption;Lewko,2010
5. Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation;Attrapadung,2010