1. Mambo M, Usuda K, Okamoto E. Proxy signature for delegation signing operation. Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCCS’96), Mar 14-16, 1996, New Delhi, India. New York, NY, USA: ACM, 1996: 48-57
2. Yi L, Bai G, Xiao G. Proxy mutil-signature scheme: a new type of proxy signature scheme. Electronics Letters, 2000, 36(6): 527-528
3. Li X,Chen K, Li S. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. Proceedings of the 6th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’05), Dec 5-8, 2005, Dalian, China. Los Alamitos, CA, USA: IEEE Computer Society, 2005: 61-62
4. Liu Z H, Hu Y P, Ma H. Secure proxy multi-signature scheme in the standard model. Provable Security:Proceedings of the 2nd International Conference (ProvSec’08), Oct 30-Nov 1, 2008, Shanghai, China. LNCS 5324. Berlin, Germany: Springer-Verlag, 2008: 127-140
5. Cao F, Cao Z. A secure identity-based multi-proxy signature scheme. Computer and Electrical Engineering, 2009, 35(1): 86-95
6. Xiong H, Hu J, Chen Z, et al. On the security of an identity based multi-proxy signature scheme. Computers and Electrical Engineering, 2011, 37(2): 129-135
7. Shum K, Wei V K. A strong proxy signature scheme with proxy signer privacy protection. Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE’02), Jun, 10-12, 2002, Pittsburgh, PA, USA. Piscataway, NJ, USA: IEEE, 2002: 55-56
8. Lee N, Lee M F. The security of a strong proxy signature scheme with proxy signer privacy protection. Applied Mathematics and Computation, 2005, 161(3): 807-812
9. Gu L Z, Li Z X, Yang Y X. A anonymous proxy signature scheme without a trusted party. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-50(in Chinese)
10. Lu R B, He D K, Wang C J, et al. Cryptanalysis and improvement of a new proxy signature scheme. Journal of Electronics and Information Technology, 2007, 29(10): 2539-2532(in Chinese)
11. Yu Y, Xu C, Huang X, et al. An efficient anonymous proxy signature scheme with provable security. Computer Standards & Interfaces, 2009, 31(2): 348-353
12. Shamiir A. On the generation of cryptographically strong pseudorandom sequences. ACM Transactions on Computer Systems, 1983, 1(1): 38-44
13. Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. Proceedings of the 1st ACM Conference on Computer and Communication Security (CCS’93), Nov 3-5, 1993, Fairfax, VA, USA. New York, NY, USA: ACM, 1993: 62-73
14. Pointcheval D, Stern J. Security arguments for digital signature and blind signature. Journal of Cryptology, 2000, 13(3): 361-396 |