Hierarchical Id Based Cryptography Examples