4Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Advances in Cryptology-Crypto'82.New York: Plenum Press, 1983 : 199-203. 被引量:1
5Mambo M, Usuda K, Okamoto E.Proxy signatures for dele-gating signing operation[C]//Advances in the 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996 : 48-57. 被引量:1
6Mambo M, Usuda K, Okamoto E.Proxy signatures: delega- tion of the power to sign messages[J].IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996,79(9) : 1338-1354. 被引量:1
7Anderson R.Two remarks on public key cryptology[C]//The Fourth ACM Computer and Communication Security.New York: ACM Press, 1997 : 151-160. 被引量:1
8Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of Interna- tional Conference on Chinese Language Computing.USA: Chinese Language Computer Society Knowledge Systems Institute, 2000: 273-277. 被引量:1
9Al-Riyami S S, Paterson K G.Certificateless public key cryp- tography[C]//Advances in Cryptology-ASIACRYPT 2003.Ber- lin: Springer-Verlag, 2003 : 452-473. 被引量:1
10Lamport L.Password authentication with insecure communication[J].Communications of the ACM, 1981,24 ( 11 ) : 770-772. 被引量:1