2Steven D. Galbraith. Supersingular curves in cryptography. [ EB/OL] http://eprint. iacr. org,2002.
3jiejun Kong, Petros Zerfos, Haiyun Luo, Sorgwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad - Hoc Networks, IEEE Symposium on Computers and Communications,July 2002.
4P. GEMMEL. An introduction to threshold crytography. In CyrptoBytes, a technical newsletter of RSA Laboratories, Vol. 2, No. 7,1997.
5Zhou D L, Haas Z. Securing Ad hoc networks. IEEE Network Magazine, 1999,13 (6) : 102-05.
6Pedersen T. A threshold cryptosystem without a trusted party[A]. In EUROCRYPT' 91 [C]. Springer2Verlag,Berlin:1991:522-626.
7D. Boneh and M. Franklin. Identity - Based Encryption from the Weil Pairing. In J. Killian, editor, Advances in Cryptoloty, CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213 - 229. Springer Verlag, August 2001.
8Aram Khalili, Jonathan Kata, William A. Arbaugh. IEEE Workshop on Security and Assurance in Ad - Hoc Networks 2003.
9SHAM IR A. How to share a secret[J ]. Commun ACM, 1979,22(11) :61226131.
10Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, pp. 251 - 260, IEEE Ninth International Conference on Network Protocols(ICNP'01) ,2001.