1. Bruce Schneier, Applied Cryptography, second ed., John Wiley & Sons, New York, 1996, ISBN: 0471128457.
2. M. Kohnfelder, A method for certification, in: Tech. Rep. (MIT Laboratory for Computer Science), MIT Press, Cambridge, MA, 1978. ISBN:0001-0782178/0200-0120.
3. Contemporary Cryptology: The Science of Information Integrity;Simmons,1992
4. A. Shamir. Identity based cryptosystems and signature schemes, in: Advances in Cryptology,CRYPTO_84, Lecture Notes Comput. Sci., 1984, pp. 47–53 ISBN: 978-3-540-15658-1 DOI: 10.1007/3-540-39568-7_5.
5. M. Girault, Self-certified public keys, in: Advances in Cryptology, EUROCRYPT_91, Lecture Notes Comput. Sci., 1991, pp. 491–497 ISBN: 3-540-66695-8.