1. How to leak a secret;R L Rivest;Advances in Cryptology -ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and 755 Information Security, Gold Coast, Australia,2001
2. Id-based blind signature and ring signature from pairings;F Zhang;Advances in Cryptology -ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security,2002