Research noteKey authentication scheme for cryptosystems based on discrete logarithms
References (9)
Self-certified public keys
Identity-based cryptosystems and signature schemes
Contemporary Cryptology: The Science of Information Integrity
A Method for Certification
(1978)
There are more references available in the full text version of this article.
Cited by (0)
Copyright © 1996 Published by Elsevier B.V.