[1] MAMBO M,USUDA K,OKAMOTO E.Proxy Signature:Delegation of the Power to Sign Messages [J].IE ICE Trans. on Fundamentals of Electronics Communications and Computer Science,1996,E79-A(9):1 338-1 354.[2] ZHANG K.Proxy Signature Schemes [A].Proc. of the 1st Int’l Information Security Workshop (ISW’97),LNCS 1396 [C].Berlin:Springer-Verlag,1997.[3] LAL S,AWASTHI A K.Proxy Blind Signature Scheme [EB/OL].http:/eprint.iacr.org/,2003-07-13.[4] YI Li-jiang,BAI Guo-qiang,XIAO Guo-zhen.Proxy Multi-Signature Scheme [J].Electron. Lett.,2003,36:527-528.[5] SHUM K,WEI V K.A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection [A].Proc. of the 11th IEEE Int’l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE’02) [C].New York:IEEE Press,2002.[6] SUN HUNG-MIN,HSIEH BIN-TSAN.Cryptanalysis of a Strong Proxy Signature Scheme with Proxy Signer Privacy Protection [A].Proc. of the IEEE 37th Annual 2003 International Conference on Security Technology [C].New York:IEEE Press,2003.[7] 王晓明,符方伟.可撤销匿名性的盲代理签名方案 [J].计算机学报,2003,26(1):51-54.[8] 傅晓彤,杨礼珍,肖国镇.对可撤销匿名性的盲代理签名方案的注记 [J].计算机学报,2005,28(8):1 404-1 407.[9] FU Xiong-tong,KOU Wei-dong,XIAO Guo-zhen.A Proxy Signature Scheme with Proxy Signer Privacy Anonymity [A].Proc. of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East’04) [C].New York:IEEE Press,2004.