1. Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of the 4th Annual International Cryptology Conference (Crypto’84). Aug 19-22, 1984, Santa Barbara, CA, USA. LNCS 196. Berlin, Germany: Springer-Verlag, 1985: 47-53
2. Boneh D, Franklin M K. Identity based encryption from the Weil pairing. Proceedings of the 21st Annual International Cryptology Conference (Crypto’ 01), Aug 19-23, 2001, Santa Barbara, CA, USA. LNCS 2139. Berlin, Germany: Springer-Verlag, 2001: 213-229
3. Smart N P. An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters, 2002, 38(13): 630-632
4. Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings. Proceedings of the 16th IEEE Computer Security Foundations Workshop, Jun 30-Jul 2, 2003, Pacific Grove, CA, USA. Piscataway, NJ, USA: IEEE, 2003: 219-233
5. Chen L, Cheng Z, Smart N P. Identity-based key agreement protocols from pairings. International Journal of Information Security, 2007, 6(4): 213-241
6. Cheng Z H, Chen L Q, Comley R, et al. Identity-based key agreement with unilateral identity privacy using pairings. Proceedings of Information Security Practice and Experience 2006, Apr 11-14, 2006, Hangzhou, China. Heidelberg, Germany: Springer-Verlag, 2006: 202-213
7. Kasahara M. ID based cryptosystems with pairing on elliptic curve. Proceedings of the 2003 Symposium on Cryptography and Information Security (SCIS’ 03), Mar 25, 2003, Hamamatsu, Japan. 2003: 265-273
8. McCullagh N, Barreto P S L M. A new two-party identity-based authenticated key agreement. Proceedings of Topics in Cryptology
(CT-RSA’05), Feb 14-18, 2005, San Francisco, CA, USA. LNCS 3376. Berlin, Germany: Springer-Verlag, 2005: 262-274
9. Cheng Z H, Chen L Q. On security proof of McCullagh-Barreto’s key agreement protocol and its variants. International Journal of Security and Networks, 2007, 2(3): 251-259
10. Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. Proceedings of the 6th IMA International Conference on Cryptography and Coding (IMA’97), Dec 17-19, 1997, Cirencester, UK. LNCS 1355. Berlin, Germany: Springer-Verlag, 1997: 30-45
11. Bellare M, Rogaway P. Entity authentication and key distribution. Proceeding of the 13th Annual International Cryptology Conference (Crypto’93), Aug 22-26, 1993, Santa Barbara, CA, USA. LNCS 773. Berlin, Germany: Springer-Verlag, 1993: 232-249