G Yang, CH Tan - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In certificateless cryptography, a user secret key is derived from two partial secrets: one is
the identity-based secret key (corresponding to the user identity) generated by a Key …