1. [1] S.S. Al-Riyami and K.G. Paterson, “Certificateless public key cryptography,” Advances in Cryptology, ASIACRYPT 2003, Lecture Notes in Computer Science, vol.2894, pp.452-473, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.
2. [2] D.F. Aranha and C.P.L. Gouvêa, RELIC is an Efficient Library for Cryptography. https://github.com/relic-toolkit/relic
3. [3] M.H. Au, Y. Mu, J. Chen, D.S. Wong, J.K. Liu, and G. Yang, “Malicious kgc attacks in certificateless cryptography,” Proc. 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS'07, pp.302-311. ACM, New York, NY, USA, 2007, http://eprint.iacr.org/2006/255
4. [4] M. Bellare and P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols,” Proc. 1st ACM Conference on Computer and Communications Security, CCS'93, pp.62-73, 1993.
5. [5] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM J. Comput., vol.32, no.3, pp.586-615, 2003.