[1] Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]// Proceedings of the 3rd ACM Conference on Computer and Communications Security. USA: ACM, 1996:48-57. [2] Goldwasser S, Micali S, Rivest R L.A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks[J]. SIAM Journal on Computing (SI064-8275), 1988, 17(2): 281-308. [3] Boldyreva A,Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights [J]. Journal of Cryptology (S0933-2790), 2012, 25(1): 57-LI 5. [4] Schuldt Jacob C N, Matsuura K, Paterson K G Proxy Signatures secure against proxy key exposure[C]// Public Key Cryptography - PKC 2008. Berlin, Germany: Springer, 2008: 141-161. [5] Shamir A.Identity based cryptosystems and signature schemes[C]// Advances in Cryptology-CRYPTO,84. Berlin, Germany: Springer-Verlag, 1984: 47-53. [6] Boneh D, Franklin M.Identity based encryption from the Weil pairing[C]// Advances in Cryptology - CRYPTO 2001. Berlin, Germany: Springer-Verlag, 2001: 213-229. [7] Hess F.Efficient identity based signature schemes based on pairings[C]// Selected Areas in Cryptography-S AC *2002. Berlin, Germany:Sprmger-Verlag, 2002: 310-324. [8] Zhang Fangguo, Kim K.Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings[C]// 8th Australasian Conference, ACISP 2003. Berlin, Germany: Springer, 2003: 312-323. [9] Xu Jing, Zhang Zhenfeng, Feng Dengguo.ID-based Proxy Signature using Bilinear Pairing[C]// ISPA 2005 International Workshops. Berlin, Germany: Springer-Verlag, 2005: 359-367. [10] Shim K A.An Identity-Based Proxy Signature Scheme from Pairings[C]// 8th International Conference, ICICS 2006. Berlin, Germany: Springer, 2006: 60-71 [11] Wu Wei, Mu Yi, Susilo W, et al.Identity-based Proxy Signature from Pairing[C]// 4th International Conference, ATC 2007. Berlin, Germany: Springer-Verlag, 2007: 22-31. [12] Kim S, Park S, Won D.Proxy signature, revisited[C]// ICICS '97 Proceedings of the First International Conference on Information and Communication Security. London, UK: Springer-Verlag, 1997: 223-232. [13] Lee B, Kim H, Kim K.Strong proxy signature and its applications[C]// Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS'01). Japan: The Institute of Electronics, Information and Communication Engineers, 2001: 603-608. [14] Hsu Chien-Lung, Wu Tzong-Sun, Wu Tzong-Chen.New nonrepudiable threshold proxy signature scheme with known signers[J]. Joiimal of Systems and Software (S0164-1212), 2001, 58(2): 119-124. [15] Jiang Guanxiong.A new proxy multi-signature scheme[C]// Networking and Digital Society - ICNDS *09. USA: IEEE, 2009: 134-138. [16] Coron J S.On the exact security of full domain hash[C]// Advances in Cryptology-CRYPTO 2000. Berlin, Germany: Springer-Verlag, 2000: 229-235. |