1. Identity-based cryptosystems and signature schemes;Shamir,1984
2. Identity-based encryption from the weil pairing;Boneh,2001
3. Random oracles are practical: a paradigm for designing efficient protocols;Bellare,1993
4. Efficient selective-id secure identity-based encryption without random oracles;Boneh,2004
5. Secure identity based encryption without random oracles;Boneh,2004