1. Bruce Schneier, Applied Cryptography, second ed., John Wiley & Sons, New York, 1996, ISBN: 0471128457.
2. A method for certification;Kohnfelder,1978
3. Contemporary Cryptology: The Science of Information Integrity;Simmons,1992
4. A. Shamir. Identity based cryptosystems and signature schemes, in: Advances in Cryptology,CRYPTO_84, Lecture Notes in Computer Science, 1984, pp. 47–53 ISBN: 978-3-540-15658-1 DOI: 10.1007/3-540-39568-7_5.
5. M. Girault, Self-certified public keys, in: Advances in Cryptology, EUROCRYPT_91, Lecture Notes in Computer Science, 1991, pp. 491–497 ISBN: 3-540-66695-8.