ID-based encryption
Certificate-based encryption
Crypt
Ciphertext
ID-based cryptography
Proxy re-encryption
Cryptography
Public-key cryptography
Electronic commerce