https://9dok.net/document/y6elom55-securing-constrained-networks-id-based-cryptography-short-signatures.html