Boneh D, Franklin M. Identity based encryption from Weil pairing//CRYPTO 2001. Berlin: Springer-Verlag, 2001: 213-229.
[2]
Adams C, Lloyd S. Understanding pubkic-key infrastructure: concepts, standards and deployment considerations[M]. : Macmillan Technical Publishing, 1999: 78-128.
[3]
Libert B, Quisquater J. J. What is possible with identity based cryptography for PKIs and what still must be improved//LNCS 3093. Berlin: Springer-Verlag, 2004: 57-70.
[4]
Chen L, Harrison K, Soldera D, et al. Applications of multiple trust authorities in pairing based cryptosystems//LNCS 2437. Berlin: Springer-Verlag, 2002: 260-275.
[5]
Gentry C. Certificate-based encryption and the certificate revocation problem//Advances in Cryptology-EUROCRYPT 2003. Berlin: Springer-Verlag, 2003: 272-293.
[6]
Al-Riyami S, Paterson K. Certificateless public key cryptography//Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452-472.
[7]
Lee B, Boyd E, Daeson E, et al. Secure key issuing in ID-based cryptography//Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin: Australian Computer Society, Inc, 2004: 69-74.
[8]
Desmedt Y, Frankel Y. Threshold cryptosystem//Advances in Cryptology-Crypto 1989. Berlin: Spring-Verlag, 1989: 231-236.
[9]
Shamir A. Identity-based cryptosystem and signature schemes//CRYPTO 1984. Berlin: Springer-Verlag, 1984: 47-53.