A strategy for transforming public-key cryptosystems into identity-based cryptosystems | IEEE Conference Publication | IEEE Xplore