참고문헌
- S. S. Al-Riyami, K. G. Paterson. Certificateless Public Key Cryptography. In Proc. Asiacrypt'03. LNCS 2784. Springer Verlag. Lecture Notes in Computer Science series, 2003
- D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. In Proc. Crypto '01. LNCS 2139. pages 213-229. 2001. See (3) for the full version
- D. Boneh and M. Franklin. Identitybased encryption from the weil pairing. SIAM J. of Computing. Vol. 32. No.3, pp. 586-615, 2003 https://doi.org/10.1137/S0097539701398521
- J. C. Cha and J. H. Cheon. An identity- based signature from gap DiffieHellman group, Public Key Cryptography 2003: 18-30
- L. Chen. K. Harrison. A. Moss, D. Soldera. and N. P. Smart. Certification of public keys within an identity based system. In A. H. Chan and V. D. Gligor. editors. Information Security. 5th International Conference, ISC. volume 2433 of LNCS, pages 322-333. Springer-Verlag, 2002
- L. Chen and C. Kudla. Identity based authenticated key agreement from pairing. CSFW 2003: 219-233
- R. Dupont. A. Enge. Provably secure non-interactive key distribution based on pairings. to appear in Discrete Applied Mathematics. Preliminary version in Proceedings of the International Workshop on Coding and Cryptography. Versailles-WCC 2003
- E. Fujisaki, T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Advances in Cryptology- Crypto'99. LNCS 1666. Springer. pp.537-554. 1999
- C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem, In E. Biham, editor, Advances in Cryptology- EUROCRYPT 2003, volume 2656 of LNCS, pages 272-193. Springer-Verlag, 2003
- C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, Advances in Cryptology-Asiacrypt'02, Lecture Notes in Computer Science 2501. SpringerVerlag, pp.548-566, 2002 https://doi.org/10.1007/3-540-36178-2_34
- F. Hess, Efficient identity based signature schemes based on pairings, to appear in proceedings of SAC '2002. Springer Verlag, Lecture Notes in Computer Science series
- B. Libert and J. J. Quisquater. New identity based signcryption schemes based on pairings, IEEE Information Theory Workshop 2003, Paris, France, or full version in Cryptology ePrint Archive, Report 2003/023, 2003, http:// eprint. iacr. org/.
- B. Lynn. Authenticated identity-basedencryption. Cryptology ePrint Archive, Report 2002/072, 2002, http://eprint.iacr.org/
- K. G. Paterson, ID-based signatures from pairings on elliptic curves, Electronics Letters, Vol. 38 (18) (2002). 1025-1026 https://doi.org/10.1049/el:20020682
- A. Shamir. Identity-based cryptosysterns and signature schemes. In Proc. Crypto '84. LNCS 196. pages 47-53. 1984
- N. P. Smart. An identity-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters. Vol 38. pp 630-632, (2002) https://doi.org/10.1049/el:20020387
- 김태구, 염대현, 이필중, 보다 효율적인 Hierarchical ID-based cryptosystem. 정보 보호 학회 논문지 제13권 제3호, 2003
- 김현주, 오수현, 원동호, 효율적인 ID 기반부분 은닉 서명에 관한 연구, 정보보호 학회논문지 제13권 제6호, 2003
- 이정연, 천정희, 김태성, 진승헌, Bilinear 함수를 이용한 ID 기반 대리서명 기법, 정보 보호 학회 논문지 제13권 제2호, 2003