1. Baek, J., Zheng, Y.: Identity-Based Threshold Decryption. IACR ePrint Archive Report 2003/164
2. Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proceedings of the First ACM Conference on Computer and Communications Security 1993, pp. 62–73 (1993)
3. Lecture Notes in Computer Science;M. Bellare,1995
4. Boneh, D., Ding, X., Tsudik, G., Wong, C.: A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In: Proceedings of the 10th USENIX Security Symposium, USENIX (2001)
5. Lecture Notes in Computer Science;D. Boneh,2001