1. Abelson, H., Anderson, R., Bellovin, S.M., Benaloh, J., Blaze, M., Diffie, W., Gilmore, J., Neumann, P.G., Rivest, R.L., Schiller, J. I., Schneier, B., 1998. The risks of key recovery, key escrow, and trusted third-party encryption. http://www.schneier.com/paper-key-escrow.pdf.
2. Certificateless public key cryptography;Al-Riyami,2003
3. CBE from CL-PKE: a generic construction and efficient schemes;Al-Riyami,2005
4. Certificate based (linkable) ring signature;Au,2007
5. Identity-based encryption from the weil pairing;Boneh,2001