SHAMIR A.How to Share a Secret[J].Communication of the ACM, 1979, 22(11):612-613. doi: 10.1145/359168.359176
DESMEDT Y.Society and Group Oriented Cryptography:a New Concept[J].Cryptography, 1987, 20(5):739-760.
DESMEDT Y, FRANKEL Y.Threshold cryptosystems[C]//On Advances in Cryptology.New York: Springer-Verlag, 1989.
SHOUP V, GENNARO R.Securing Threshold Cryptosystems Against Chosen Ciphertext Attack[C]//International Conference on the Theory and Applications of Cryptographic Techniques.Berlin: Springer, 1998.
BONEH D, BOYEN X, HALEVI S.Chosen Ciphertext Secure Public Key Threshold Encryption without Random Oracles[C]//Cryptographers Track at the RSA Conference on Topics in Cryptology.New York: Springer-Verlag, 2006: 226-243.
BONEH D, FRANKLIN M. Identity Based Encryption from the Weil Pairing[J].IEEE Trans on Wireless Commun, 2003, 32(3):213-229.
BONEH D, CANETTI R, HALEVI S, et al.Chosen-Ciphertext Security from Identity-Based Encryption[C]//Proceedings of Eurocrypt 2004.New York: Springer-Verlag, 2004: 207-222.
BONEH D, BOYEN X.Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles[J].Proceedings of Eurocrypt, 2004, 2004(4):172.
FUJISAKI E, OKAMOTO T.How to Enhance the Security of Public-Key Encryption at Minimum Cost[C]//International Workshop on Public Key Cryptography.Berlin: Springer, 1999: 53-68.
李帅丽, 郑严, 包小敏.基于双线性对与身份的数字签名方案研究[J].西南大学学报(自然科学版), 2009, 31(5):71-74.