1 Gentry C . Certificate-based Encryption and the Certificate Revocation problem . Proceedings of
EUROCRPYT 2003, LNCS 2656,Springer-Verlag:272-293.
2 Al-Piyami SS, Peterson KG.Certificateless public keycryptography.Proceedings of Asiacrypt LNCS3-43,Springer-Verlag, 2003:452-474.
3 Chen L, Harrison K, Soldera D, Smart N P. Applicationsof Multiple Trust Authorities in Pairing Based Crypto systems. Proceedings of the International Conference on Infrastructure Security, 2002:260-275.
4 Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S. Secure key issuing in ID-based cryptography.
Proceedings of the second workshop on Australasian Information Security, Data Mining and Web Intelligence,and Software Internationalisation, 2004:69-74.
5 Xu C, Zhou J, Qin Z.A note on secure key issuing in ID-based cryptography. http://eprint.iacr.org/2005/180.
6 Boneh D, Franklin M.Identity-based encryption from the Weil Pairing.Advances in Cryptology-Crypto. 01.-LNCS 2139. J Kilian ed, Berlin Springer- Verlag.2001: 213-239.
7 Cha J, Cheon J.An identity-based signature from Diffie-Hellman groups. Public Key Cryptography
Proceedings of PKC2003, LNCS2567, Berlin:SPringer-Verlag, 2003:18-30.