1. Hiroaki Anada , Seiko Arita , and Kouichi Sakurai . 2016. Attribute-Based Two-Tier Signatures: Definition and Construction . In Information Security and Cryptology - ICISC 2015 , Soonhak Kwon and Aaram Yun (Eds.). Springer International Publishing , Cham, 36–49. Hiroaki Anada, Seiko Arita, and Kouichi Sakurai. 2016. Attribute-Based Two-Tier Signatures: Definition and Construction. In Information Security and Cryptology - ICISC 2015, Soonhak Kwon and Aaram Yun (Eds.). Springer International Publishing, Cham, 36–49.
2. D. F. Aranha C. P. L. Gouvêa T. Markmann R. S. Wahby and K. Liao. [n. d.]. RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic. D. F. Aranha C. P. L. Gouvêa T. Markmann R. S. Wahby and K. Liao. [n. d.]. RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic.
3. M. Bellare , C. Namprempre , and G. Neven . 2004 . Security Proofs for Identity-Based Identification and Signature Schemes. In EUROCRYPT 2004(LNCS, Vol. 3027) , C. Cachin and J.L. Camenisch (Eds.). Springer, 268–286. M. Bellare, C. Namprempre, and G. Neven. 2004. Security Proofs for Identity-Based Identification and Signature Schemes. In EUROCRYPT 2004(LNCS, Vol. 3027), C. Cachin and J.L. Camenisch (Eds.). Springer, 268–286.
4. M. Bellare and P. Rogaway . 1993. Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols . In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS ’93) . ACM, 62–73. M. Bellare and P. Rogaway. 1993. Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS ’93). ACM, 62–73.