Shamir A. Identity-based cryptosystems and signature schemes//Blakley G R, Chaum D. Crypto 1984. New York: Springer-Verlag, 1984: 47-53.
[2]
Al-Riyami S, Paterson K G. Certificateless public key cryptography//Laih C S. Asiacrypt 2003. Taipei: Springer-Verlag, 2003: 452-473.
[3]
Du Hongzhen, Wen Qiaoyan. Efficient and provably-secure certificateless short signature scheme from bilinear pairings. . Computer Standards and Interfaces.
[4]
Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation//Proceedings of CCS 96. New Delhi: ACM, 1996: 48-57.
[5]
Lee B, Kim H, Kim K. Strong proxy signature and its applications//Proceeding of ACISP 2001. Oiso: Springer, 2001: 603-608.
[6]
Gu Chunxiang, Zhu Huafei. An efficient ID-based proxy signature scheme from pairings. .
[7]
周亮, 杨文忠, 杨义先. 有限次的代理签名方案[J]. 北京邮电大学学报, 2008, 31(3): 103-106. Zhou Liang, Yang Wenzhong, Yang Yixian. Proxy signature scheme with restricted signing capability[J]. Journal of Beijing University of Posts and Telecommunications, 2008, 31(3): 103-106.
[8]
Li Xiangxue, Chen Kefei. Certificateless signature and proxy signature schemes from bilinear pairings[J]. Lithuanian Mathematical Journal, 2005, 45(1): 76-83.
[9]
Lu Rongbo, He Dake, Wang Changji. Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings//Eighth ACIS International Conference on SNPD 2007. Qingdao: IEEE, 2007: 285-290.