[1]
“Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model”, INF, vol. 32, no. 2, Accessed: Nov. 15, 2025. [Online]. Available: https://puffbird.ijs.si/index.php/informatica/article/view/192