J Yu, R Hao, F Kong, X Cheng, J Fan,
Y Chen - Information Sciences, 2011 - Elsevier
The security of traditional identity-based signatures wholly depends on the security of secret
keys. Exposure of secret keys requires reissuing all previously assigned signatures. This …