1. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil Pairing. Asiacrypt 2001. LNCS (Vol. 2248, pp. 514–532). Heidelberg: Springer.
2. Chin, J.-J., Anada, H., & Tan, S.-Y. (2015).Reset-secure identity-based identification schemes without pairings. To appear at ProvSec 2015, LNCS. Heidelberg: Springer.
3. Chin, J.-J., Tan, S.-Y., Kam, Yvonne, H.-S., & Leong, C.-H. (2014). Implementation of identity-based and certificateless identification on Andriod platform. Cryptology 2014. UPM Press, Universiti Putra Malaysia, pp. 205–215.
4. Fujioka, A., Saito, T., & Xagawa, K. (2012). Applicability of OR-proof techniques to hierarchical identity-based identification. CANS 2012, LNCS 7712 (pp. 169–184). Heidelberg: Springer.
5. Kurosawa, K., & Heng, S.-H. (2004). From Digital Signatures to Identity-Based Identification. PKC 2004. LNCS (Vol. 2947, pp. 248–261). Heidelberg: Springer.