[1] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages//IEICE Trans. Fundamentals: , 1996: 1338-1353. [2] 刘益和, 刘嘉勇. 一个可控的代理签名方案[J]. 四川大学学报(自然科学版), 2004, 41(5): 982-985. Liu Yihe, Liu Jiayong. One controllable proxy signature scheme[J]. Journal of Sichuan University (Natural Science Edition), 2004, 41(5): 982-985. [3] 谷利泽, 李中献, 杨义先. 不需要可信任方的匿名代理签名方案[J]. 北京邮电大学学报, 2005, 28(1): 48-50. Gu Lize, Li Zhongxian, Yang Yixian. A anonymous proxy signature scheme without a trusted party[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(1): 48-50. [4] Yu Yong, Yang Bo. Identity-based threshold signature and mediated proxy signature schemes[J]. The Journal of China Universities of Posts and Telecommunications, 2007, 14(2): 69-74. [5] Seungjoo Kim, Sangjoo Park, Dongho Won. Proxy signatures, revisited. Proceedings of International Conference on Information and Communications Security, Lecture Notes in Computer Science, 1997, 1334(6): 223-232. [6] Lee Jung Yeun, Jung Hee Cheon, Seungjoo Kim. An analysis of proxy signatures: is a secure channel necessary?//Topics in Cryptology-CT-RSA 2003, Lecture Notes in Computer Science. Berlin: , 2003: 68-79. |