1. Shamir A, Rivest R, Tauman T (2001) How to leak secret. In: Asiacrypt'01 LNCS 2248, 552,565.
2. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Crypto 1984, volume 196 of lecture notes in computer science. Springer, pp 47–53
3. Zhang F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: Asiacrypt 2002, volume 2501 of lecture notes in computer science. Springer, pp 533–547
4. Chien, H-Y (2008) Highly efficient Id-based ring signature from pairings. In: APSCC, pp 829–834
5. Awasthi AK, Lal S (2005) Id-based ring signature and proxy ring signature schemes from Bilinear pairings. Corr, Abs/Cs/0504097