Deterministic Public-key Encryption Research Articles