What are the different kinds of verifications in the encryption phase for a scheme, I am finding a very similar verification part in all schemes that is generally of the form ((g1^t).(g2))^r where t is hash of c1=g^r. Is there any other different method for the TRAPDOOR function