CHEN L,HARRISON K,SOLDERA D,et al.Applications of multiple trust authorities in pairing based cryptosystems[C]∥Proc of Infrastructure Security Conference.Berlin:Springer-Verlag,2002:260-275.
[2]
GENTRY C.Certificate-based encryption and the certificate revocation problem[C]∥Advances in Cryptology-EUROCRYPT2003.Berlin:Springer-Verlag,2003:272-293.
[3]
AL-RIYAMI S,PATERSON K.Certificateless public key cryptography[C]∥Advances in Cryptology-Asiacrypt'2003.Berlin:Springer-Verlag,2003:452-472.
[4]
LEE B,BOYD E,DAESON E,et al.Secure key issuing in ID-based cryptography[C]∥In Proceedings of the SecondAustralian Information Security Workshop-AISW 2004.New Zealand:Australian Computer Society,Inc,2004:69-74.
[5]
SHAMIR A.Identity-based cryptosystem and signature schemes[C]∥Advances in Cryptology 1984.Berlin:Springer-Verlag,1984:47-53.
[6]
PATERSON K G.ID-based signatures from pairings on elliptic curves[J].Electronics Letters,2003,38(18):1025-1026.
[7]
BONEHD,FRANKLINM.Identity based encryption from weil pairing[C]∥Advances in Cryptology1984.Berlin:Springer-Verlag,2001:213-229.
[8]
BONEHD,FRANKLI N M.Short signature from weil pairing[C]∥Boyd C Asiacrypt 2001,Berlin:Springer-Verlag,2001:514-532.