[1] Shamir A. Identity-based cryptosystems and signature schemes//Blakley G R, Chaum D. Crypto 1984. New York: Springer-Verlag, 1984: 47-53. [2] Al-Riyami S, Paterson K G. Certificateless public key cryptography//Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473. [3] Du Hongzhen, Wen Qiaoyan. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. . Computer Standards and Interfaces. http://doi. org/10. 1016. [4] Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation//Proceedings of CCS 96. New Delhi: ACM, 1996: 48-57. [5] Lee B, Kim H, Kim K. Strong proxy signature and its applications//Proceeding of ACISP 2001. Oiso: Springer, 2001: 603-608. [6] Gu Chunxiang, Zhu Huafei. An efficient ID-based proxy signature scheme from pairings. . http://eprint. org/2006/158. [7] 周亮, 杨文忠, 杨义先. 有限次的代理签名方案[J]. 北京邮电大学学报, 2008, 31(3): 103-106. Zhou Liang, Yang Wenzhong, Yang Yixian. Proxy signature scheme with restricted signing capability[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(3): 103-106. [8] Li Xiangxue, Chen Kefei. Certificateless signature and proxy signature schemes from bilinear pairings[J]. Lithuanian Mathematical Journal, 2005, 45(1): 76-83. [9] Lu Rongbo, He Dake, Wang Changji. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings//Eighth ACIS International Conference on SNPD 2007. Qingdao: IEEE, 2007: 285-290. |