L Yi,G Bai,G Xiao.Proxy multi-signature scheme:A new type of proxy signature scheme[J].ElectronicLetters,2000,36 (6):527-528.
[2]
D Boneh,B Lynn,H Shacham.Short signatures from the Weil pairing[A].LNCS 2248,Advances in Cryptology-Crypto 2001[C].Berlin:Springer-Verlag,2001.514-532.
[3]
C Cocks.An identity based encryption scheme based on quadratic residues[A].LNCS 2260,Cryptography and Coding 2001[C].Berlin:Springer-Verlag,2001.360-363.
[4]
A Shamir.Identity-based cryptosystems and signature schemes[A].LNCS 196,Advances in Cryptology-Crypto 1984[C].Berlin:Springnr-Verlag,1984.47-53.
[5]
D Boneh,M Franklin.Identity-based encryption from the Weil pairing[A].LNCS 2139,Advances in Cryptology-Crypto 2001[C].Berlin:Springer-Verlag,2001.213-229.
[6]
F Zhang,K Kim.Efficient ID-based blind signature and proxy signature from bilinear pairings[A].LNCS 2727,ACISP 2002[C].Berlin:Springer-Verlag,2002.312-323.