[1] Mambo M, Usuda K, Okamoto K. Proxy signatures: delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1353.[2] Jiang Yali, Kong Fanyu, Ju Xiuling. Lattice-based proxy signature[C]//CIS 2010. Nanning:[s.n.], 2010: 382-385.[3] 夏峰, 杨波, 马莎, 等. 基于格的代理签名方案[J]. 湖南大学学报: 自然科学版, 2011, 38(6): 84-88. Xia Feng, Yang Bo, Ma Sha, et al. Lattice-based proxy signature scheme[J]. Journal of Hunan University Natural Sciences, 2011, 38(6): 84-88.[4] Wang Chunxiao, Qi Mingnan. Lattice-based proxy signature scheme[J]. Journal of Information and Computational Science, 2011, 12(8): 2451-2458.[5] Kim K S, Hong D, Jeong I R. Identity-based proxy signature from lattices[J]. Journal of Communications and Networks, 2013, 15(1): 1-7.[6] Lyubashevsky V. Lattice signatures without trapdoors[C]//Pointcheval D, Johansson T (eds.). Eurocrypt 2012. LNCS. Berlin: Springer-Verlag, 2012: 738-755.[7] Gentry C, Peikert C, Vaikuntanathan V. How to use a short basis: trapdoors for hard lattices and new cryptographic constructions[C]//Cynthia D(ed.), STOC 2008. New York:[s.n.], 2008: 197-206. |