1. Identity-based chameleon hash and applications;Ateniese,2004
2. On the key exposure problem in chameleon hashes;Ateniese,2005
3. Convertible undeniable signatures;Boyar,1991
4. Efficient algorithms for pairing-based cryptosystems;Barreto,2002
5. Short signatures from the Weil pairings;Boneh,2001