[1]
Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages. EICE Trans. Fundamentals, 1996, E79-A9: 1338-1353.
Google Scholar
[2]
Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications[C]. Proceedings of Eurocrypt 1996. Lecture Notes in Computer Science 1070, Berlin: Springer-Verlag, 1996, 143-154.
DOI: 10.1007/3-540-68339-9_13
Google Scholar
[3]
Ji-Seon Lee, Jik Hyun Chang. Designated Confirmer Proxy Signature Scheme[C]. ICACT2007: 137-140.
Google Scholar
[4]
Saeednia S, Kramer S, Markovitch O. An efficient strong designated verifier signature scheme[C]∥Inf-ormation Security and Cryptology. Berlin: Springere-rlag, 2003: 143-154.
DOI: 10.1007/978-3-540-24691-6_4
Google Scholar
[5]
Lipmaa H, Wang Guilin, Bao Feng. Designated verifier signatureschemes: attacks. new security notions and a new construction. In: Proc of the 32 nd InternationalColloquium on Automata, Languagesand Programming(ICALP2005), LNCS3580, Springer-Verlag, 2005: 459-471.
DOI: 10.1007/11523468_38
Google Scholar
[6]
YangBo, XiaoZibi, YangYixian, etc. Strong Multi-Designated Verifiers Signature Scheme [J]. JournalofBei jingUniversit yofPostsandTelecommunications, 2007, 30(5): 1-4.
Google Scholar
[7]
Yaling Zhang,Jing Zhang,Yikun Zhang. Multi-sign-ers Strong Designated Verifier Signature Scheme[C]. Ninth ACIS International Conference on Software Eng-ineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing: 2008, 324-328.
DOI: 10.1109/snpd.2008.68
Google Scholar
[8]
Jianhong Zhang, Qin Geng. Efficient Provably Secure Designated Verifier Signature Scheme without Random Oracle[C]. 2009 International Conference on Networks Security, Wireless Communications and Trusted Compu-ting: 2009, 29-33.
DOI: 10.1109/nswctc.2009.402
Google Scholar
[9]
Zhang Bo, Xu Qiuliang. a Strong Designated verif-ier Proxy Signature scheme[C]. Second International Workshop on Knowledge Discovery and Date Mining: 2009, 569-572.
DOI: 10.1109/wkdd.2009.65
Google Scholar