[Summary this paper] 1) Why do the authors need to employ identity-based encryption instead of regular public-key encryption?