[1]
Mambo M., Usuda K., Okamoto E. Proxy signature for delegating signing operation. Proceedings of the 3. th ACM Conference on Computer and Communications Security, New York: ACM Press, 1996, 48~57.
DOI: 10.1145/238168.238185
Google Scholar
[2]
Boldyreva A., Palacio A., Warinschi B. Secure proxy signature scheme for delegation of signing rights. IACR ePrint Archive, available at http: /eprint. iacr. org/2003/096.
DOI: 10.1007/s00145-010-9082-x
Google Scholar
[3]
Huang X., Mu Y., Susilo W., et al. A short proxy signature scheme: efficient authentication in the ubiquitous world. UISW2005, LNCS 3823, Berlin: Springer-Verlage, 2005, 480~489.
DOI: 10.1007/11596042_50
Google Scholar
[4]
Lee B., Kim H., Kim K. Strong proxy signature and its applications. In Proc of SCIS2001, Vol. 2/2, 2001, 603~608.
Google Scholar
[5]
Yi L., Bai G., Xiao G. Proxy multi-signature scheme: a new type of proxy signature schemes. Electronics Letters, 2000, 36(6): 527~528.
DOI: 10.1049/el:20000422
Google Scholar
[6]
Hsu Chien-Lung, Wu Tzong-Son, He Wei-HUa. New proxy multi-signature scheme. Applied Mathematics and Computation, 162 (2005): 1201~1206.
DOI: 10.1016/j.amc.2004.03.001
Google Scholar
[7]
WANG Qin and CAO Zhenfu. Formal model of proxy multi-signature and a construction. CHINESE JOURNAL OF COMPUTERS. 2006, 29(9): 1628~1635.
Google Scholar
[8]
Cao feng and Cao Zhenfu. Security model of proxy-multi signature schemes. In: CANS 2006, LNCS 4301, Berlin: Springer-Verlage, 2006, 144~152.
DOI: 10.1007/11935070_9
Google Scholar
[9]
Waters B. Efficient identity-based encryption without random oracles. In: Eurocrypt 2005 , LNCS 3494 , Berlin : Springer-Verlag, 2005, 114~127.
DOI: 10.1007/11426639_7
Google Scholar