1. Adams, C., Farrell, S.: Internet X.509 Public Key Infrastructure Certificate Management Protocols. Internet Engineering Task Force: RFC 2510
2. Adida, B., Hohenberger, S., Rivest, R.L.: Separable Identity-Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks. In: DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service, April 14–15, 2005, Piscataway, NJ, USA (to appear, 2005)
3. Bellare, M., Rogaway, P.: Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
4. Lecture Notes in Computer Science;A. Bender,2006
5. Lecture Notes in Computer Science;J. Camenisch,2002