Libert B, Quisquater J-J. What is possible with identity based cryptography for PKIs and what still must be improved [C]// LNCS 3093. Berlin: Springer-Verlag, 2004:57-70.
[5]
Chen L , Harrison K, Soldera D, et al. Applications of multiple trust authorities in pairing based cryptosystems [C]// LNCS 2437. Berlin: Springer-Verlag, 2002: 260- 275.
[6]
Gentry C. Certificate-based encryption and the certificate revocation problem[C]//Advances in Cryptology- EUROCRYPT 2003. Berlin: Springer-Verlag, 2003:272-293.
[7]
Al-Riyami S, Paterson K. Certificateless public key cryptography[C]// Advances in Cryptology- Asiacrypt’ 2003. Berlin: Springer-Verlag,, 2003:452-472.
[8]
Lee B, Boyd E, Daeson E, et al. Secure key issuing in ID-based cryptography[C]// Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin: Australian Computer Society, Inc, 2004:69-74.
[9]
Desmedt Y, Frankel Y. Threshold cryptosystem[C]// Advances in Cryptology-Crypto 89. Berlin: Spring- Verlag, 1989:231-236.