1A Herzberg, S Jarecki, H Krawczyk, et al. Proactive secret sharing, or: how to cope with perpetual leakage[A]. D Coppersmith. Advances in Crytptolgy-Crypto' 95 Proceedings,LNCS 963[C]. Berlin: Springer-Verlag, 1995. 339-352.
2D Chaum,T P Pedersen. Transferred cash grows in size[A].R A Rueppel. Advance in Cryptology-Euroerypt'92 Proceedings, LNCS 658[C]. Berlin: Springer-Verlag, 1993. 390-407.
3J Baek, Y Zheng. Identity-based threshold decryption[A]. F Bao. Public Key Cryptography Proceedings of PKC 2004,LNCS 2947[ C]. Berlin: Springer-Verlag, 2004. 262- 276.
4C Gentry, A Silverberg. Hierarchical ID-based cryptography[A]. Y Zheng. Advances in Cryptology-Asiacrypt 2002,LNCS 2501[C]. Berlin: Springer-Verlag, 2002. 548-566.
5J Horwitz, B Lynn. Toward hierarchical identity-based encryption[A]. L R Knudsen. Advances in Cryptology-Eurocrypt 2002, LNCS 2332[C]. Berlin: Springer-Verlag, 2002.466 - 481.
6A Shamir. Identity-based cryptosystems and signature schemes[A]. B Blakely. Proc. of Crypto'84,LNCS 196[C]. Berlin:Springer-Verlag, 1984. 47 - 53.
7Y Desmedt, J Quisquater, Public-key systems based on the difficulty of tampering[A]. A M Odlyzko. Proc. of Crypto '86,LNCS263[C]. Berlin: Springer-Verlag, 1987. 111- 117.
8H Tanaka. A realization scheme for the identity-based crypto-system[A]. C Pomerance. Prec. of Crypto '87, LNCS 293[C]. Berlin: Springer-Verlag, 1987. 341 - 349.
9U Maurer, Y Yacobi. Non-interactive public-key cryptography[A]. D W Davies. Proc. of Eurocrypto '91, LNCS 547[C].Berlin: Springer-Verlag, 1992. 498 - 507.
10D Boneh, M Franklin. Identity based encryption from the Weil pairing[A]. J Kilian. Advances in Cryptology-Crypto 2001,LNCS 2139[ C]. Berlin: Springer-Verlag, 2001. 213 - 229.