ID-based cryptographic schemes for user identification, digital signature, and key distribution | IEEE Journals & Magazine | IEEE Xplore