1. Asmuth, C., Bloom, J.: A Modular Approach to Key Safeguarding. IEEE Trans. On Information Theory IT-29(2), 208–210 (1983)
2. Burmester, M., vo Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: Advances in Cryptology-EUROCRYPT 1994, pp. 275–285. Springer, Heidelberg (1994)
3. Cramer, R., Shoup, V.: A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack. In: Advances in Cryptology: Proceedings of CRYPTO 1998, pp. 13–25. Springer, Heidelberg (1986)
4. Lecture Notes in Computer Science;Y. Desmedt,1990
5. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31, 469–472 (1985)