1. Identity-based cryptosystems and signature schemes;Shamir,1984
2. Certificateless public key cryptography;Al-Riyami,2003
3. Generic construction of certificateless signature;Yum,2004
4. Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings;Li,2005
5. Certificateless public-key signature: security model and efficient construction;Zhang,2006