1. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedins of Advances in Cryptology-Crypto. 1984, 47–53
2. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceedings of Advances in Cryptology-Crypto. 2001, 213–229
3. Beak J, Newmarch J, Safavi-Naini R, Susilo W. A survey of identitybased cryptography. In: Proceedings of Australian Unix Users Group Annual Conference. 2004, 95–102
4. Desmedt Y, Frankel Y. Threshold cryptosystems. In: Proceedings of Advances in Cryptology-CRYPTO. 1990, 307–315
5. Santis A, Desmedt Y, Frankel Y, Yung M. How to share a function securely. In: Proceedings of 26th ACM Symposium on Theory of Computing. 1994, 522–533