1. Certificateless public key cryptography;Al-Riyami,2003
2. J. Baek, R. Safavi-Naini, W. Susilo, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, in: PKC 2005, Lecture Notes in Computer Science, vol. 3386, 2005, pp. 380–397.
3. Entity authentication and key distribution;Bellare,1994
4. Key agreement protocols and their security analysis;Blake-Wilson,1997
5. W. Chen, L. Zhang, B. Qin, Q. Wu, H. Zhang, Certificateless one-way authenticated two-party key agreement protocol, in: IEEE IAS 2009, 2009, pp. 483–486.