[1]
Shamir, Identity-base cryptosystems and signature schemes, Proc. Of Crypto 84, Lecture Notes in Computer Science, Vol. 196, pp.47-53, Springer-Verlag, 1985.18,19, 29.
DOI: 10.1007/3-540-39568-7_5
Google Scholar
[2]
F. Hess, Efficient identity based signature schemes based on pairings, In Proceedings of 9th workshop on selected areas in Cryptography – SAC 2002, LNCS, Springer-Verlag, 2002, pp.310-324
DOI: 10.1007/3-540-36492-7_20
Google Scholar
[3]
K.G. Paterson, Id-based signatures from pairings on elliptic curves, Cryptology ePrint Archive, Report 2002/004, (2002)
Google Scholar
[4]
N.P. Smart, An identity based authenticated key agreement protocol based on the weil pairing, Electronic Letters, 38(13), 2002, pp.630-632
DOI: 10.1049/el:20020387
Google Scholar
[5]
Yi, X, An Identity-Based Signature Scheme from the Weil Pairing, IEEE Communications Letters, Vol. 7(2), 2003, pp.76-78.
DOI: 10.1109/lcomm.2002.808397
Google Scholar
[6]
J.C. Cha and J.H. Cheon, An identity-based signature from gap Diffie- Hellman groups, PKC 2003, LNCS 2567, Springer-Verlag, 2003, pp.18-30.
DOI: 10.1007/3-540-36288-6_2
Google Scholar
[7]
X. G Cheng, J. M Liu, and X.M Wang, Identity-based aggregate and verifiably encrypted signatures from bilinear pairing, O. Gervasi et al. (Eds.): Springer-Verlag Berlin Heidelberg 2005ICCSA 2005, LNCS 3483, 2005, pp.1046-1054.
DOI: 10.1007/11424925_109
Google Scholar
[8]
D. Boneh and M. Franklin, Identity Based Encryption from the Weil Pair- ing, Proc. of Crypto 01, Lecture Notes in Computer Science, Vol. 2139, pp.213-229, Springer-Verlag, 2001. (A full version is available from http://crypto.stanford.edu/ dabo/pubs.html) 18, 19, 21, 22, 26, 27, 28, 29.
DOI: 10.1007/3-540-44647-8_13
Google Scholar
[9]
Y. Desmedt and J. Quisquater, Public-key Systems based on the Difficulty of Tampering, Proc. of Crypto 86, Lecture Notes in Computer Sciences, Vol. 263, pp.111-117, Springer-Verlag, 1987.
DOI: 10.1007/3-540-47721-7_9
Google Scholar
[10]
U. Maurer and Y. Yacobi, Non-interective public-key cryptography, Proc. of Eurocrypto 91, Lecture Nores in Computer Sciences, Vol. 547, pp.498-507, Springer-Verlag, 1992.
DOI: 10.1007/3-540-46416-6_43
Google Scholar
[11]
H. Tanaka, A realization scheme for the identity-based cryptosystem, Proc. of Crypto 87, Lecture Nores in Computer Sciences, Vol. 293, pp.341-349, Springer-Verlag, 1987.
Google Scholar
[12]
S. Tsuji and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No. 4, pp.467-473, 1989.
DOI: 10.1109/49.17709
Google Scholar
[13]
D. Boneh, B. Lynn, and H. Shacham, Short Signatures from the Weil Pairing, Proc. of Asiacrypt 01, Lecture Notes in Computer Sciences, Vol. 2248, pp.514-532, Springer-Verlag, 2001.
DOI: 10.1007/3-540-45682-1_30
Google Scholar
[14]
Hongzhen Du,Qiaoyan Wen,An efficient Identity-based short signature scheme from Bilinear Pairings, international Conference on Computational intelligence and security,2007,p.725 – 729.
DOI: 10.1109/cis.2007.168
Google Scholar
[15]
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto, A Proposal of Short Proxy Signature using Pairing, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I, pp.631-635.
DOI: 10.1109/itcc.2005.27
Google Scholar
[16]
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, J. of Cryptology, Vol. 13, pp.361-396, 2000.
DOI: 10.1007/s001450010003
Google Scholar