1. [1] M. Bellare and A. Palacio, “GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks,” CRYPTO 2002, ed. M. Yung, Lect. Notes Comput. Sci., vol.2442, pp.162-177, Springer-Verlag, 2002.
2. [2] K. Kurosawa and S.H. Heng, “From digital signature to ID-based identification/signature,” PKC 2004, Lect. Notes Comput. Sci., vol.2947, pp.248-261, Springer-Verlag, 2004.
3. [3] M. Bellare, C. Namprempre, and G. Neven, “Security proofs for identity-based identification and signature schemes,” J. Cryptology, vol.22, no.1, pp.1-61, Jan. 2009.
4. [4] R. Cramer, Modular Design of Secure, yet Practical Cryptographic Protocols, Ph.D. thesis, University of Amsterdam, 1996.
5. [5] J.J. Chin, S.H. Heng, and B.M. Goi, “Hierarchical identity-based identification schemes,” FGIT-SecTech 2009, Communications in Computer and Information Science, vol.58, pp.93-99, Springer-Verlag, 2009.