6ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North China University of Technology, Beijing 100041,China,2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security, Beijing 100080, China,3. Institute of Computer Science and Technology, Peking University, Beijing 100871, China.Another ID-Based Proxy Signature Scheme and Its Extension[J].Wuhan University Journal of Natural Sciences,2007,12(1):33-36. 被引量:3
7Lin W D,Jan J K. A security personal learning tools using a proxy blind signature scheme. Proceedings of International Conference on Chinese Language Computing[ C ]. Illinois, USA, 2000:273 - 177. 被引量:1
8Hung M S, Bin T H. On the Security of Some Proxy Blind Signature Schemes [ J ]. Australasian Information Security Workshop, Dunedin: Australian Computer Society press,2004:75 - 78. 被引量:1
9Wang S B, Hong F, Cui G H. Secure Efficient Proxy Blind Signature Schemes Based DLP [ C ]. Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. 2005:452-455. 被引量:1
10Chien H Y. Forgery attacks on multi-signature schemes for authenticating mobile code delegates [ J ]. IEEE Transactions on vehicular Technology,2002,51 (6) : 1669 - 1671. 被引量:1