1. Multicast Networking and Applications;Miller,1999
2. S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: ASIACRYPT 2003, LNCS, vol. 2894, 2003, pp. 452–473.
3. M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: ACM CCCS ’93, 1993, pp. 62–73.
4. D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in: EUROCRYPT 2003, LNCS, vol. 2656, 2003, pp. 416–432.
5. D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: Asiacrypt 2001, LNCS, vol. 2248, 2001, pp. 514–532.