3Boneh D, Lynn B, Shaeham H.Short, signatures from the Weil Pairing[C]//Boyd C.LNCS 2248: Advances in Cryptology-ASIACRYPT 2001, 7th International Conference on the Theory and Application ofCryptology and Information Security, Gold Coast, Australia,December 9-13, 2001.Berlin:Springer-Verhg, 2001, 2248:514-532.
1[3]S Goldwasser, M Bellare. Lecture notes on cryptography [J/OL]. http://theory. lcs. mit. edu/shafi.
2[4]Goldwasser, Micali, Rivest. A digital signature scheme secure against adaptive chosen-message attacks[J]. SIAM Journal of computing, 1988.4,17 (2): 281 - 308.
3[1]Pointcheval , Stern. security arguments for digital signatures and blind signatures [ J ]. Journal of cryptology, 2000,13 ( 3 ):361 - 396.
4[2]Pointcheval, Stem. Security proofs for signatures [ A]. In Proceedings of EUROCRPT' 96 [ C ]. Lecture Notes in Computers Science, Springer- verlag, 1996, 387 - 398.
5Canneti R,Halevi S,Katz J.A forward secure public key encryption scheme[C]//Proc of Eurocrypt'03,LNCS 2656,Berlin:Springer-Verlag,2003:255-271.
6Dodis Y,Katz J,Xu S,et al.Key-insulated public key cryptosystems[C]//Proc of Eurocrypt'02,LNCS 2332,Berlin:Springer-Verlag,2002:65-82.
7Dodis Y,Franklin M,Katz J,et al.Intrusion-resilient public-key encryption[C]//Proc of CT-RSA'03,LNCS 2612,Berlin:Springer-Verlag,2003:19-32.
8Joux A.A one-round protocol for tripartite Diffie-Hellman[C]//Proc of Fourth Algorithmic Number Theory Symposium,LNCS 1838,Berlin:Springer-Verlag,2000:385-394.
9Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C]//Proc of Crypto'01,LNCS 2139,Berlin:Springer-Verlag,2001:213-229.
10Cha J C,Cheon J H.An Identity-based signature from Gap Diffie-Hellman Groups[C]//Proc of PKC'03,LNCS 2567,Berlin:Springer-Verlag,2003:18-30.