Information technology. Security techniques. Digital signatures with appendix. Identity-based mechanisms Part 2, (15th March 2000)