[1] MAMBO M,USUDA K,OKAMOTO E.Proxy Signature:Delegation of the Power to Sign Messages [J].IE ICE Trans. on Fundamentals of Electronics Communications and Computer Science,1996,E79-A(9):1 338-1 354.
[2] ZHANG K.Proxy Signature Schemes [A].Proc. of the 1st Int’l Information Security Workshop (ISW’97),LNCS 1396 [C].Berlin:Springer-Verlag,1997.
[3] LAL S,AWASTHI A K.Proxy Blind Signature Scheme [EB/OL].http:/eprint.iacr.org/,2003-07-13.
[4] YI Li-jiang,BAI Guo-qiang,XIAO Guo-zhen.Proxy Multi-Signature Scheme [J].Electron. Lett.,2003,36:527-528.
[5] SHUM K,WEI V K.A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection [A].Proc. of the 11th IEEE Int’l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE’02) [C].New York:IEEE Press,2002.
[6] SUN HUNG-MIN,HSIEH BIN-TSAN.Cryptanalysis of a Strong Proxy Signature Scheme with Proxy Signer Privacy Protection [A].Proc. of the IEEE 37th Annual 2003 International Conference on Security Technology [C].New York:IEEE Press,2003.