1Mambo M, Usuda K, Okamoto E. Proxy Signatures: Delegation of the Power to Sign Measages[J]. IEICE Trans, 1996, E79-A(9): 1338- 1354. 被引量:1
2Miller V S. use of elliptic Curves in Cryptography[A]. Advances in Cryptology(CRYPTO85,Lecture Notes in Comptuer Science): Vol 128[C]. Berli n: Springer-Veralg, 1980. 417-426. 被引量:1
3Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Compu tation, 1987, 48(177): 203-209. 被引量:1
4Zhang Fangguo, Naini R S, Lin C Y. New Proxy Signature, Proxy Blin d Signature and Proxy Ring Signature Schemes from Bilinear Pairing[DB/OL]. htt p://eprint.iacr.org/2003-10-04. 被引量:1