Hierarchical Identity-based Encryption Scheme Research Articles