1. Security proofs for identity-based identification and signature schemes;Bellare,2004
2. Entity autentication and key distribution;Bellare,1994
3. Unknown key-share attacks on the station-to-station (STS) protocol;Blake-Wilson,1999
4. Authenticated Diffie–Hellman key agreement protocols;Blake-Wilson,1999
5. Identity-based encryption from the Weil pairing;Boneh,2001