[1]Mambo M, Usuda K, Okamoto E. Proxy signature: Delegation of the power to sign messages[J]. IEICE Trans. Fundamentals, 1996:E79-A(9):1338-1354.
[2]Boldyreva A, Palacio A, Warinschi B. Secure proxy signature scheme for delegation of signing rights[J]. Journal of Cryptology, 2003,25(1):57-115.
[3]Boneh D, Boyen X. Short signatures without random oracles[C]// Advances in Cryptology(EUROCRYPT 2004). 2004:56-73.
[4]Okamoto T, Inomata A, Okamoto E. A proposal of short proxy signature using pairing[C]// International Conference on Information Technology (ITCC 2005). 2005:631-635.
[5]李明祥,韩伯涛,朱建勇,等. 在标准模型下安全的基于身份的代理签名方案[J]. 华南理工大学学报(自然科学版), 2009,37(5):118-122,129.
[6]Cao Feng, Cao Zhenfu. Security model of proxymulti signature schemes[M]// Cryptology and Network Security. Springer Berlin Heidelberg, 2006,4301:144-152.
[7]Huang Xinyi, Susilo W, Mu Yi, et al. Proxy signature without random oracles[C]// Second International Conference, MSN 2006. Springer Heidelberg, 2006,4325:473-484.
[8]Dodis Y, Katz J, Xu S, et al. Keyinsulated public key cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques(Advances in Cryptology Eurocrypt’2002). SpringerVerlag, 2002:65-82.
[9]Dodis Y, Katz J, Xu Shouhuai, et al. Strong key insulated signature schemes[C]// Proceedings of the PKC 2003. 2003:130-144.
[10]Zhou Yuan, Cao Zhenfu, Chai Zhenchuan. Identitybased key insulated signature[C]// Proceedings of the 2rd International Information Security Practice and Experience Conference. Springer Berlin Heidelberg, 2006,3903:226-234.
[11]Weng Jian, Liu Shengli, Chen Kefei, et al. Identitybased key insulated signature without random oracles[C]// Computational Intelligence and Security International Conference. Springer Berlin Heidelberg, 2006,4456:470-480.
[12]Hong Xuan, Chen Kefei. Secure keyinsulated proxy signature scheme for mobile agent[C]// International Conference on Innovative Computing. 2007:513-516.
[13]Wan Zhongmei, Lai Xuejia, Weng Jian, et al. Identitybased keyinsulated proxy signature[J]. Journal of Electronics(China), 2009,26(6):853-858
[14]Chen Jianhong, Long Yu, Chen Kefei, et al. Identitybased keyinsulated proxy signature without random oracles[J]. Journal of Shanghai Jiaotong University(English Edition), 2011,16(5):557-566.
[15]Paterson K G, Schuldt J C N. Efficient identitybased signature secure in the standard model[C]// The 11th Australasian Conference, ACISP 2006. Springer, 2006,4058:207-222.
[16]Waters B. Efficient Identitybased encryption without random oracles[C]// The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2005,3494:114-127.
[17]Ming Yang, Wang Yumin. Directed proxy signature in the standard model[J]. Journal of Shanghai Jiaotong University(English Edition), 2011,16(6):663-671. |