3. Al-Riyami S, Paterson K. Certificateless public key cryptography. Advances in Cryptology: Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt’03), Nov 30-Dec 4, 2003, Taipei, China. LNCS 2894. Berlin, Germany: Springer-Verlag, 2003: 452-473
5. Huang X, Mu Y, Susilo W, et al. Certificateless signature revisited. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP’07), Jul 2-4, 2007, Townsville, Australia. LNCS 4586. Berlin, Germany: Springer-Verlag, 2007: 308-22
6. Liu Z H, Hu Y P, Zhang X S, et al. Certificateless signcryption scheme in the standard model. Information Sciences, 2010, 180(3): 452-464
8. Zhang K. Threshold proxy signature schemes. Proceedings of the 1st International Information Security Workshop (ISW’97), Sep 17-19, 1997, Tatsunokuchi, Japan. LNCS 1396. Berlin, Germany: Springer-Verlag, 1997: 282-290
9. Pradhan S, Mohapatra R K, Proxy blind signature based on ECDLP. International Journal of Engineering Science and Technology, 2011, 3(3): 2244-2248
10. Li X X, Chen K F, Li S Q. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. Proceedings of the 5th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT’04), Dec 8-10, 2004, Singapore. LNCS 3320. Berlin, Germany: Springer-Verlag, 2005: 61-62
12. Cao F, Cao Z F. A secure identity-based multi-proxy signature scheme. Computers and Electrical Engineering, 2009, 35(1): 86-95
13. Jin Z P, Wen Q Y. Certificateless multi-proxy signature. Computer Communications, 2011, 34(3): 344-352
|