“…Theorem 1 The two non-identity based receiptor-oriented encryption schemes in section 4 both have the soundness. In other words, if {ff, f4} is a legal ciphertext returned by the encryptioner on plaintext m C {0, 1}n, then the decryptioner will surely recover the plaintext m E {0, 1}n such that Dup,u,sp,vp,p(Eup,sp,s,sp,p(m, r)) = m (2) where E and D are the encryption and the decryption algorithms respectively; r is a random element chosen by the encryptioner; and other data are the same to what in the two non-identity based ROE schemes in section 4.…”