1W.Diffie,M.E.Hellman,New directions in cryptography,IEEE Transactions on information The-ory,IT-22(6),1976,644-654.
2R.L.Rivest,A.Shanfir and L.Adleman,A Method for Obtaining Digital Signatures and Public Key Cryptosystem Comm.ACM.21 (1978)120-126.
3S.Goldwasser and S.Micali,Micali,Probabilitic encryption and how to play mental poker.keeping secret all partial information,In STOC'82,ACM,1982,pp.365-377.
4A.Shamir,Identity-based cryptosystems and signature schemes,In Advancesin Cryptology-Crypto'84,LNCS,Berlin,springer-Verlag,1984,pp.47-53.
5C.Rackoff and D.simon,Non-interactive zero-knowledge proof of knowledge and chosen cipher-text attack,In Advances in Cryptology -Crypto'91,LNCS 576,Springer,1991,99.433-444.
6D.Boneh,and M.Franklin,Identity-based Encryption from the Well pairing,SIAM,Journal ofComputing,vol.32(3),2003,586-615.In Advances in Crptology-Cryto'01,LNCS 2139,Berlin,Sprin -ger Verlag,2001,pp.213-229].
7C.Cocks,An Identity Based Encryption Scheme Based on Quadratic Residues,In Proceedings of the IMA conference on Cryptography and Coding 2001,LNCS 2260,SpringVerlag,2001,pp.360 -363.
5BELLARE M, POINTCHEVAL D, ROGAWAY P. Authenticated key exchange secure against dictionary attacks[C]//Intemational Conference on the Theory and Application of Cryptographic Techniques, May 14-18, 2000, Bruges, Belgium. Bedim Springer Berlin Heidelberg, 2000: 139-155.
6SHAMIR A. Identity-based cryptosystems and signature schemes [C]//CRYPTO 84. Berlin: Springer Berlin Heidelberg, 1985: 47-53.
7BONEH D, FRANKLIN M. Identity based Eneryption from the Weil pairing [c~,rFhe 21st Annual International Cryptology Conference, August 19-23, 2001, Santa Barbara, California, USA. Bedim Springer Berlin Heidelberg, 2001:213-229.
8KMIOKA T, SHIMIZU A. The examination of the security of SAS one-time password authentication [R]. IEICE Tecknical Report, 2001: 156-161.
9NEUKIRCH J. Algebraic Number Theory [M]. Berlin: Springer Berlin Heidelberg, 1999: 267-298.