1. [1] C. Adams, S. Farrell, T. Kause, and T. Mononen, “Internet X.509 public key infrastructure certificate management protocols (CMP),” Request for Comments (RFC) 4210, Internet Engineering Task Force, Sept. 2005.
2. Optimistic fair exchange of digital signatures
3. [3] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” Proc. Eurocrypt'03, Lect. Notes Comput. Sci., vol.2656, pp.416-432, Springer-Verlag, 2003.
4. [5] S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, “Sequential aggregate signatures and multisignatures without random oracles,” Proc. EUROCRYPT'06, Lect. Notes Comput. Sci., vol.4004, pp.465-485, Springer-Verlag, 2006.
5. [6] T. Ristenpart and S. Yilek, “The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks,” Proc. Eurocrypt'07, Lect. Notes Comput. Sci., vol.4515, pp.228-245, Springer-Verlag, 2007.