[1]
Chaum D Blind signature for untraceable payments[A] Chaum D, Rivest R L, Shepman A T. Advances in Cryptology: Crypto1982 [C]. New York: Plemum, 1982:199-203.
DOI: 10.1007/978-1-4757-0602-4_18
Google Scholar
[2]
LIN W D, JAN J K. A security personal learning tools using a proxy blind signature scheme [C] //Proc of International Conferece on Chinese Language Computing. Washington DC: IEEE Computer Society, 2000: 273-277.
Google Scholar
[3]
Al-Riyami S, Paterson K. Certificateless public key cryptography [C] //LNCS 2894: Asiacrypt 2003, 2003: 452-473.
DOI: 10.1007/978-3-540-40061-5_29
Google Scholar
[4]
Chen Hu, Song Rushun. Certificateless proxy signature and proxy blind signature scheme [J]. Computer Engineering and Applications, 2009, 45(9): 92-97.
DOI: 10.3724/sp.j.1087.2010.03341
Google Scholar
[5]
Wei Chunyan, Cai Xiaoqiu. New certificateless proxy blind signature [J]. Computer Applications, 2010, 30(12): 3343-3345.
DOI: 10.3724/sp.j.1087.2010.03341
Google Scholar
[6]
Zhang Jianz , Peng Lih , Xue Rongh . A certificateless proxy blind signature [J]. Computer Engineering, 2011, 7(14):112-117.
Google Scholar
[7]
Liu Juxia, Su Jingf. The proxy blind signature scheme based on discrete logarithm [J]. Computer Engineering and Applications, 2010, 46(25): 94-96.
Google Scholar
[8]
Xu Chung, Zhang Aoh. Proxy signature scheme based on discrete logarithm problem of certificateless [J]. Nanjing University of Technology (Natural Science), 2010, 34(6): 733-737.
Google Scholar
[9]
Wang Huig, Wang Caif, Cao Hao, Cheng Jieh. Certificateless signature scheme based on discrete logarithm[J]. Computer Engineering and Design, 2011,32(10): 3284-3286.
Google Scholar
[10]
Wan Li, Li Fangw, Yan Shaoj. Analysis and Improvement of a proxy blind signature scheme [J]. Computer Applications, 2011,31(4):989-991.
DOI: 10.3724/sp.j.1087.2011.00989
Google Scholar