Generalised key delegation for hierarchical identity-based encryptionM. AbdallaE. Kiltzet al.2008IET Information Security
Security proofs for identity-based identification and signature schemesMihir BellareChanathip Namprempreet al.2008Journal of Cryptology